This is an example of a simple banner

Training: Defend against cyberthreats with Microsoft Defender XDR (SC-5004)

Ref. SC-5004
Duration:
1
 day
Exam:
Not certifying
Level:
Intermediate

Defend against cyberthreats with Microsoft Defender XDR (SC-5004)

Protect Your Organization Against Cyber Threats

Cyberattacks are becoming increasingly sophisticated and can compromise your company’s security in an instant. Mastering detection and incident response tools is essential to ensure effective protection. With the SC-5004 training, you will learn how to use Microsoft Defender XDR to monitor, analyze, and neutralize threats in real time.

Master Microsoft Defender XDR and Enhance Your Security

This training enables you to deploy and configure Microsoft Defender for Endpoint, investigate alerts, and automate incident response. You will discover how to manage devices, analyze logs, and use the Kusto Query Language (KQL) to identify targeted attacks. Through structured learning and hands-on exercises, you will develop operational cybersecurity skills.

Designed for security analysts, this in-depth training will equip you with the knowledge to fully leverage Microsoft Defender and strengthen your organization’s resilience against cyber threats.

Participant Profiles

  • Security operations analysts
  • Cybersecurity experts
  • System and network administrators
  • Incident management professionals

Objectives

  • Use the Microsoft Defender portal to manage incidents
  • Deploy and configure Microsoft Defender for Endpoint
  • Set up alerts and threat detections
  • Automate incident and device management
  • Analyze threats and leverage connection logs
  • Use Kusto Query Language (KQL) to investigate attacks

Prerequisites

  • Experience with the Microsoft Defender portal
  • Basic knowledge of Microsoft Defender for Endpoint
  • Fundamental understanding of Microsoft Sentinel

Course Content

Module 1: Mitigate incidents using Microsoft Defender

  • Use the Microsoft Defender portal
  • Manage incidents and investigate alerts
  • Investigate incidents with Microsoft Defender XDR
  • Manage automated investigations
  • Use the action center
  • Explore advanced hunting
  • Investigate Microsoft Entra sign-in logs
  • Understand Microsoft Secure Score
  • Analyze threat analytics and reports
  • Configure the Microsoft Defender portal

Module 2: Deploy the Microsoft Defender for Endpoint environment

  • Create and configure the security environment
  • Understand operating systems compatibility and features
  • Onboard and manage devices
  • Manage access and roles
  • Create and manage roles for role-based access control
  • Configure device groups
  • Configure environment advanced features

Module 3: Configure for alerts and detections in Microsoft Defender for Endpoint

  • Configure advanced security features
  • Manage alert notifications
  • Administer alert suppression
  • Enable and manage detection indicators

Module 4: Configure and manage automation using Microsoft Defender for Endpoint

  • Configure automation settings in Microsoft Defender
  • Manage automation upload and folder settings
  • Configure automated investigation and remediation
  • Block high-risk devices

Module 5: Perform device investigations in Microsoft Defender for Endpoint

  • Use the device inventory list
  • Investigate device behavior and security risks
  • Apply behavioral blocking techniques
  • Detect and manage devices through device discovery

Module 6: Defend against cyber threats with Microsoft Defender XDR

  • Configure the Microsoft Defender XDR environment
  • Deploy Microsoft Defender for Endpoint
  • Mitigate attacks using Microsoft Defender for Endpoint

Documentation

  • Accès à Microsoft Learn, la plateforme d’apprentissage en ligne Microsoft, offrant des ressources interactives et des contenus pédagogiques pour approfondir vos connaissances et développer vos compétences techniques.

Lab / Exercises

  • Ce cours vous donne un accès exclusif au laboratoire officiel Microsoft, vous permettant de mettre en pratique vos compétences dans un environnement professionnel.

Complementary Courses

Eligible Funding

ITTA is a partner of a continuing education fund dedicated to temporary workers. This fund can subsidize your training, provided that you are subject to the “Service Provision” collective labor agreement (CCT) and meet certain conditions, including having worked at least 88 hours in the past 12 months.

Additional Information

Master Cyber Threats with a Proactive Approach

Cybersecurity now relies on a proactive approach. It is no longer enough to react to incidents; they must be anticipated and neutralized before they cause damage. Microsoft Defender XDR enables continuous monitoring and intelligent automation of attack responses. With this SC-5004 training, you will develop comprehensive expertise in cyber threat management. You will learn to identify weak signals, implement advanced detection strategies, and automate remediation to strengthen your organization’s security.

Why Microsoft Defender XDR Transforms Threat Management

Traditional cybersecurity solutions require constant human intervention and suffer from a lack of correlation between incidents. Microsoft Defender XDR changes the game by integrating multiple security tools into a unified platform. With a centralized view of all alerts and incidents, decision-making becomes faster and more efficient. Advanced artificial intelligence significantly reduces false positives and allows automated attack response. By connecting endpoints, emails, identities, and applications, this solution provides comprehensive protection capable of anticipating emerging threats.

Reduce Detection Time and Improve Threat Response

An attacker can compromise a system within minutes. The longer the detection time, the greater the consequences. With Microsoft Defender XDR, the average detection time is reduced thanks to advanced analysis algorithms. Alert management is optimized to prioritize the most critical incidents and avoid wasting time on non-relevant events. By implementing automated workflows, threats can be neutralized in seconds. Real-time log analysis quickly identifies suspicious behaviors and triggers appropriate protective measures.

Leverage KQL for Advanced Investigations

Microsoft Defender XDR generates vast amounts of data on network and device activity. To make the most of this information, it is essential to know how to query and interpret results effectively. The Kusto Query Language (KQL), used in Microsoft Sentinel and Defender environments, allows extracting relevant insights to detect anomalies and malicious behaviors. This training teaches you how to write advanced queries to analyze incidents in depth and correlate events to understand attacker tactics. By leveraging this strategic data, you will be able to make more informed decisions and strengthen your company’s security posture.

Automate Cyberattack Response for Greater Efficiency

Cybersecurity teams must handle a growing volume of incidents, making automation essential for effective protection. Microsoft Defender XDR provides tools to automatically block a compromised device as soon as a threat is detected. By adjusting access levels based on identified risks, attacks can be prevented before they spread. With real-time security patch application, vulnerabilities can be fixed without human intervention, ensuring continuous protection. Automation significantly reduces analysts’ workload while enhancing system resilience against cyberattacks.

FAQ

How does this training stand out from others?
It goes beyond just teaching a tool. It trains you in a strategic and operational approach to cybersecurity, combining theory with hands-on practice.

What are the concrete benefits for my company?
A significant reduction in incident response time, better detection of advanced attacks, and optimized security resource management.

Is this training suitable for my skill level?
If you already have a basic understanding of IT security and Microsoft environments, this training will help you quickly advance and adopt a more proactive approach.

Prix de l'inscription
CHF 850.-
Inclus dans ce cours
  • Training provided by a certified trainer
  • 180 days of access to Official Microsoft Labs
  • Official documentation in digital format
  • Official Microsoft achievement badge
Mois actuel

ven28Mar09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5004

ven28Mar09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven02Mai09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven02Mai09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5004

ven06Juin09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5004

ven06Juin09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven11juil09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven11juil09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5004

ven15Aoû09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5004

ven15Aoû09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven19Sep09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven19Sep09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5004

ven24Oct09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5004

ven24Oct09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven28Nov09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5004

ven28Nov09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5004

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday
8:30 AM to 6:00 PM
Tel. 058 307 73 00

Contact-us

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Make a request

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday, from 8:30 am to 06:00 pm.

Contact us

Your request