Welcome to the Microsoft Defender for Identity Ninja Training!
Microsoft Defender for Identity (renamed from Azure Advanced Threat Protection or Azure ATP) is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. This Ninja blog covers the features, detentions, and functions of Microsoft Defender for Identity.
Short Link: aka.ms/MDINinja
In addition, after each level, we offer you a knowledge check based on the training material you have just finished! Since there’s a lot of content, the goal of the knowledge checks is to help ensure understanding of the key concepts that were covered. Lastly, there’ll be a fun certificate issued at the end of the training: Disclaimer: This is not an official Microsoft certification and only acts as a way of recognizing your participation in this training content.
In terms of overall structuring, the training sessions are split into three different knowledge levels:
Module |
Description |
Level 1: Beginner (Fundamentals) |
Introduction to Microsoft Defender for Identity, and planning your Deployment. |
Level 2: Intermediate (Associate) |
Identity Security Posture Assessments, Investigate Lateral Movement Paths, Indicators of compromise |
Level 3: Advanced (Expert) |
Advanced Hunting with Microsoft 365 Defender |
Legend/Acronyms |
|
(D) |
Microsoft Documentation |
(V) |
Video |
(G) |
Interactive Guide |
(B) |
Blog |
MCAS |
Microsoft Cloud App Security |
RBAC |
Role-based access control |
MDI |
Microsoft Defender for Identity |
AATP |
Azure Advanced Threat Protection |
ATP |
Advanced Threat Protection |
AIP |
Azure Information Protection |
ASC |
Azure Security Center |
AAD |
Azure Active Directory |
CASB |
Cloud Access Security Broker |
MTP |
Microsoft Threat Protection |
GCC |
Government Community Cloud |
GCC-H |
Government Community Cloud High |
Note: Threat protection product names from Microsoft are changing. Read more about this and other updates here. We'll be updating names in products and in the docs soon.
In this module you will familiarize yourself with Microsoft Defender for Identity and its detection capabilities. You will also learn about Microsoft Defender for Identity architecture, deployment options, licensing and the Microsoft Defender for Identity community.
Planning your Microsoft Defender for Identity Deployment
Deploying Microsoft Defender for Identity Deployment
Ready for the Fundamentals Knowledge Check?
In this module you will familiarize yourself with Microsoft Defender for Identity Security Posture Assessments, identifying indicators of compromise, suspicious activities and attacks, and lateral movement paths.
Identity Security Posture Assessments
Identify Suspicious Activities and Advanced Attacks
Investigate Lateral Movement Paths
In this module we will learn what Lateral Movement Paths are, and how to investigate.
Indicators of Compromise
In this module we will investigate users, computers, and entities. This module includes gathering information around users, computers, and entities. Investigating activities and resources that may have been accessed.
Interactive Guides
Ready for the Intermediate Knowledge Check?
In this module you will familiarize yourself with Microsoft Defender for Identity Advanced Hunting within the Microsoft 365 Defender portal.
Advanced Hunting with Microsoft 365 Defender
In this module you will create advanced KQL threat-hunting queries. This module includes Microsoft Defender for Identity advanced KQL threat-hunting queries, and the creation of custom detection rules.
Ready for the Experts Knowledge Check?
Once you’ve finished the training and the knowledge checks, please click here to request your certificate (you'll see it in your inbox within 3-5 business days.“
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.