1. Home
  2. Training Library
  3. Microsoft 365
  4. Courses
  5. Implementing Microsoft Defender for Endpoint

Implementing Microsoft Defender for Endpoint

Introduction
Overview
Difficulty
Intermediate
Duration
14m
Students
69
Ratings
3.6/5
starstarstarstar-halfstar-border
Description

This course explores Microsoft Defender for Endpoint and how to implement it. We’ll start off with a quick overview of the three deployment phases that you’ll need to complete in order to implement Defender for Endpoint. We’ll then run through each of the individual deployment phases in a bit more detail.

Learning Objectives

By the time you finish this course, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.

Intended Audience

This course is intended for anyone who wishes to learn about the steps involved in implementing Microsoft Defender for Endpoint.

Prerequisites

To get the most out of this course, you should have a fundamental understanding of basic endpoint protection concepts.

 
Transcript

Hi there. Welcome to Implementing Microsoft Defender for Endpoint. My name is Thomas Mitchell and I’ll be taking you through this course.

I’m a Microsoft 365 instructor at Cloud Academy and I have over 25 years of IT experience, several of those with cloud technologies. If you have any questions about this course, feel free to connect with me on LinkedIn, or send an email to support@cloudacademy.com.

This quick-hitting course is intended for those who wish to learn about the steps involved in Implementing Microsoft Defender for Endpoint.

We’ll start off with a quick overview of the 3 deployment phases that you’ll need to complete in order to implement Defender for Endpoint.

We’ll then run through each of the individual deployment phases in a bit more detail.

By the time you finish this course, you should have a good understanding of what steps you need to take to implement Microsoft Defender for Endpoint.

We’d love to get your feedback on this course, so please give it a rating when you’re finished. If you’re ready to learn about implementing Microsoft Defender for Endpoint, let’s get started.

About the Author
Avatar
Thomas Mitchell
Instructor
Students
43620
Courses
57
Learning Paths
16

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.