PDP Url

Threat Detection: Planning for a Secure Enterprise

Learn about threat detection as part of a defense in-depth strategy to protect, detect, and respond to cybercrime.

Self-Paced

Learning Style

Intermediate

Difficulty

16 Hours

Course Duration

Course Info

Download PDF

Certificate

See Sample

About Individual Course:
  • Individual course plan gives you access to this course
$99.00
$99.00
/ Each
When you subscribe, you get:
Learn Subscription plan gives you access to this course and over 820 other popular courses
On Sale!
Now Only $39.99 Regular Price $44.99
Now Only $39.99 Regular Price $44.99
/ Month
Team
Pricing
  • Buy 5-9 Enrollments And Save 68% ($12.74 monthly.)
  • Buy 10-19 Enrollments And Save 72% ($11.24 monthly.)
  • Buy 20-above Enrollments And Save 78% ($8.99 monthly.)
Learn about threat detection as part of a defense in-depth strategy to protect, detect, and respond to cybercrime.

Course Information

About this course:

By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving far too many organizations vulnerable to attack. And as organizations embrace digital transformation, it becomes increasingly urgent for the organization to increase control over their IT infrastructure and reduce security risks.

This course is an overview of threat detection as part of a defense in-depth strategy. You will learn how to protect, detect, and respond to cybercrime as you explore the capabilities of threat detection and mitigation tools.

Course Objective:

After completing this course, students will be able to:

  • Describe signature-based and behavioral / heuristic detection methods
  • List the capabilities of on-premise threat detection and mitigation tools
  • Name the capabilities of hybrid and cloud threat detection and mitigation tools
  • Recognize the importance of Enterprise threat detection monitoring

Audience:

  • IT Support officer
  • Cybersecurity officer
  • Cybersecurity professional

Prerequisite:

  • The current cybersecurity ecosystem
  • Analysis of hacks on computers and networks
  • Basic Risk Management

Outline

More Information

More Information
Brand Microsoft
Subjects Information Security
Lab Access No
Technology Microsoft
Learning Style Self-Paced Learning
Difficulty Intermediate
Course Duration 16 Hours
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here