To access material, start machines and answer questions login.
Threat actors can’t orchestrate data breaches without evading security controls. Executing large-scale and impactful cyberattacks while facing strong security measures is almost unfeasible. Techniques for evading defenses ensure that each phase of an attack sequence is undetected and uncomplicated.

In this room, we will discuss techniques that threat actors use to avoid detection and bypass security controls throughout their operations to remain undetected while compromising the system or the entire infrastructure.
Learning Objectives
After completing this room, you will be able to understand the following;
- What are defense evasion tactics
- Discuss various attack techniques and how they can be mitigated
- Recognize indicators of potential defense evasion activity
- Review incidents related to a defense evasion on the Microsoft Defender XDR portal
- Explain how to mitigate and respond to a defense evasion using Microsoft Defender XDR
I am ready to dive in!
Ready to learn Cyber Security?
The XDR: Defense Evasion room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in