Blog Post

Microsoft Defender for Endpoint Blog
6 MIN READ

Become a Microsoft Defender for Endpoint Ninja

HeikeRitter's avatar
HeikeRitter
Icon for Microsoft rankMicrosoft
Jul 13, 2020

This training is currently being updated

Do you want to become a ninja for Microsoft Defender for Endpoint? We can help you get there! We collected content for two roles: “Security Operations (SecOps)” and “Security Administrator (SecAdmin)”. The content is structured into three different knowledge levels, with multiple modules: Fundamentals, Intermediate, and Expert. Some topics can be relevant for SecOps as well as for SecAdmins and are listed for both roles. We will keep updating this training on a regular basis. 

 

In addition, after each level, we offer you a knowledge check based on the training material you have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training: Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.

 

Please also check out the Ninja Show, which is based on this Ninja blog and brings you up to speed quickly on Microsoft Defender for Endpoint. In every episode, our experts guide you through the powerful features and functions of Microsoft Defender for Endpoint that help you keep your environment secure. We start with the fundamentals and dive deeper as the show continues. 

https://aka.ms/NinjaShow 

 

Table of Contents

Security Operations Fundamentals

Module 1. Technical overview

Module 2. Getting started

Module 3. Microsoft Defender Vulnerability Management

Module 4. Attack surface reduction

Module 5. Next generation protection

Module 6. Investigation – Incident

Module 7. Automated investigation and remediation

Module 8. Microsoft Defender Experts for Hunting

Module 9. Reporting

 

Security Operations Intermediate

Module 1. Architecture

Module 2. Deception & automated attack disruption

Module 3. Next generation protection.

Module 4. Advanced hunting

Module 5. Automated investigation and remediation

Module 6. Threat analytics

Module 7. Unified indicators of compromise (IOCs)

Module 8. Community (blogs, webinars, GitHub)

 

Security Operations Expert

Module 1. Responding to threats

Module 2. Alert handling

Module 3. File analysis

Module 4. Advanced hunting

Module 5. Unified indicators of compromise IOCs

Module 6. Custom reporting

Module 7. Community (blogs, webinars, GitHub)

 

Security Administrator Fundamentals

Module 1. Architecture

Module 2. Onboarding

Module 3. Grant and control access

Module 4. Security configuration

Module 5. Reporting

Module 6. SIEM Integration

 

Security Administrator Intermediate

Module 1. Microsoft Defender Vulnerability Management

Module 2. Attack surface reduction

Module 3. Next generation protection

Module 4. Advanced hunting

Module 5. Conditional access

Module 6. Microsoft Cloud App Security (MCAS)

Module 7. Community (blogs, webinars, GitHub)

Module 8. Migration

 

Security Administrator Expert

Module 1. Custom reporting (PowerBI)

Module 2.  Advanced hunting

Module 3. Custom Integrations, APIs

 

Learn about our partner integrations

 

Legend:

Product videos

Webcast recordings

Tech Community

Docs on Microsoft

 Blogs on Microsoft

 GitHub

⤴ External

 Interactive guides

 

Security Operations Fundamentals

Module 1. Overview

Module 2. Getting started

Module 3. Microsoft Defender Vulnerability Management

Module 4. Attack surface reduction

Module 5. Next generation protection

Module 6. Investigation

Module 7. Automated investigation and remediation

Module 8. Microsoft Defender Experts for Hunting

Module 9. Reporting

> Ready for the Fundamentals Knowledge Check

 

Security Operations Intermediate

Module 1.Architecture

Module 2. Deception & automated attack disruption

Module 3. Next generation protection

Module 4. Advanced hunting

Module 5. Automated investigation and remediation

Module 6. Threat analytics

Module 7. Unified indicators of compromise (IOCs)

Module 8. Community (blogs, webinars, GitHub)

 

> Ready for the Intermediate Knowledge Check?

 

Security Operations Expert

Module 1. Responding to threats

Module 2. Alert handling

Module 3. File analysis

Module 4. Advanced hunting

Module 5. Unified indicators of compromise IOCs

Module 6. Custom reporting

Module 7. Community (blogs, webinars, GitHub)

> Ready for the Expert Knowledge Check? 

 

Security Administrator Fundamentals

Module 1. Architecture

Module 2. Onboarding

Module 3. Grant and control access

Module 4. Security configuration

Module 5. Reporting

Module 6. SIEM Integration

 

> Ready for the Fundamentals Knowledge Check

 

Security Administrator Intermediate

Module 1. Microsoft Defender Vulnerability Management

Module 2. Attack surface reduction

Module 3. Next generation protection

Module 4. Advanced hunting

Module 5. Conditional access

Module 6. Microsoft Defender for Cloud Apps

Module 7. Community (blogs, webinars, GitHub)

Module 8. Migration

 

> Ready for the Intermediate Knowledge Check

 

Security Administrator Expert

Module 1. Custom reporting (PowerBI)

Module 2. Advanced hunting

Module 3. Custom Integrations, APIs

Learn about our partner integrations

 

> Ready for the Expert Knowledge Check? 

 

Once you’ve finished the training and the knowledge checks, please click here to request your certificate (you'll see it in your inbox within 3-5 business days.)

 
Updated Jan 19, 2024
Version 42.0