Published 1/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 5.50 GB | Duration: 8h 54m
Microsoft SOC eeer Today. Learn Alerts, Incident, Ms defender for endpoint, Office 365, Sentinel, Cloud and KQL... What you'll learn What is Microsoft defender for Endpoint (MDE) What is Microsoft defender for Office 365 What is Microsoft defender for identity What is Microsoft defender for Cloud What is Azure identity protection Learn KQL Investigation incidents and alerts Detection of threat Insider risks Qzure sentinel Requirements Microsoft 365 administration is a good start Description The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.What will be cover in this course : Introduction to Microsoft 365 threat protectioigate incidents using Microsoft 365 DefenderProtect your identities with Azure AD Identity ProtectionRemediate risks with Microsoft Defender for Office 365Safeguard your environment with Microsoft Defender for IdentitySecure your cloud apps and services with Microsoft Defender for Cloud AppsRespond to data loss prevention alerts using Microsoft 365Manage insider risk in Microsoft PurviewProtect against threats with Microsoft Defender for EndpointDeploy the Microsoft Defender for Endpoint environmentImplement Windows security enhancements with Microsoft Defender for EndpointPerform device investigations in Microsoft Defender for EndpointPerform actions on a device using Microsoft Defender for EndpointPerform evidence and entities investigations using Microsoft Defender for EndpointConfigure and manage automation using Microsoft Defender for EndpointConfigure for alerts and detections in Microsoft Defender for EndpointUtilize Vulnerability Management in Microsoft Defender for EndpointPlan for cloud workload protections using Microsoft Defender for CloudConnect Azure assets to Microsoft Defender for CloudConnect non-Azure resources to Microsoft Defender for CloudManage your cloud security posture managementExplain cloud workload protections in Microsoft Defender for CloudRemediate security alerts using Microsoft Defender for CloudConstruct KQL statements for Microsoft SentinelAnalyze query results using KQLBuild multi-table statements using KQLWork with data in Microsoft Sentinel using Kusto Query LanguageIntroduction to Microsoft SentinelCreate and manage Microsoft Sentinel workspacesQuery logs in Microsoft SentinelUse watchlists in Microsoft SentinelUtilize threat intelligence in Microsoft SentinelConnect data to Microsoft Sentinel using data connectorsConnect Microsoft services to Microsoft SentinelConnect Microsoft 365 Defender to Microsoft SentinelConnect Windows hosts to Microsoft SentinelConnect Common Event Format logs to Microsoft SentinelConnect syslog data sources to Microsoft SentinelConnect threat indicators to Microsoft Sentinel Threat detection with Microsoft Sentinel analyticsAutomation in Microsoft SentinelThreat response with Microsoft Sentinel playbooksSecurity incident management in Microsoft SentinelIdentify threats with Behavioral AnalyticsData normalization in Microsoft SentinelQuery, visualize, and monitor data in Microsoft SentinelManage content in Microsoft SentinelExplain threat hunting concepts in Microsoft SentinelThreat hunting with Microsoft SentinelUse Search jobs in Microsoft SentinelHunt for threats using notebooks in Microsoft SentinelAnd moreNice training ! Overview Section 1: Introduction Lecture 1 Introduction Section 2: Preparation Lecture 2 How to prepare this training Lecture 3 License Section 3: Threat detections Lecture 4 What are Threat Lecture 5 Simulation presentation Section 4: Microsoft defender 365 Lecture 6 How to access Ms defender Lecture 7 Investigation incidents and alerts Lecture 8 Manage alerts Lecture 9 Automated investigation AIR Lecture 10 Action center Lecture 11 Advanced hunting with KQL Section 5: Azure identity protection Lecture 12 What is Azure AD identity protection Section 6: Microsoft defender for Office 365 Lecture 13 Defender for office 365 safe attachment Lecture 14 Defender for office 365 safe links Lecture 15 Defender for office 365 anti phishing Lecture 16 Defender for office 365 interactive presentation Section 7: Microsoft defender for indentity Lecture 17 Protect your onprem assets with Ms defender for identity Section 8: Microsoft defender for Apps Lecture 18 Microsoft defender for cloud Apps (overview) Section 9: Data loss prevention (overview) Lecture 19 What is DLP Lecture 20 Insider risks Section 10: Microsoft defender for endpoint Lecture 21 What is Ms defender for endpoint Lecture 22 Onboard device and diags Lecture 23 Onboard your first device with Powershell script Lecture 24 Run attack on MDE Lecture 25 RBAC with MDE Lecture 26 Permissions Lecture 27 ASR Rules and advanced protection Lecture 28 Deploy ASR with intunes Section 11: Microsoft defender for cloud Lecture 29 What is MS defender for cloud Lecture 30 Interactive guide Lecture 31 Connect your assets Lecture 32 Connect your no azure assets Lecture 33 Manage the alerts Lecture 34 Enable Ms defender for cloud Section 12: Kusto Query Language (KQL) overview Lecture 35 How to use Kusto Query Language (KQL) Section 13: Azure sentinel Lecture 36 What is azure entinel Lecture 37 What are connectors Lecture 38 Add Azure VM to sentinel Lecture 39 Add no azure VM to sentinel Lecture 40 Add no linux VM to sentinel Lecture 41 Add logic app and link to ms teams Lecture 42 Create a schedule query rule Lecture 43 Enable UEBA Section 14: The exam Lecture 44 Some review questions Lecture 45 Others questions Security Operations Analyst,M365 administrator HomePage: gfxtra__Microsoft_.part1.rar.html gfxtra__Microsoft_.part2.rar.html gfxtra__Microsoft_.part3.rar.html gfxtra__Microsoft_.part4.rar.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.