Curriculum For This Course
Video tutorials list
-
Introduction
Video Name Time 1. Configuring the Lab Environment 21:00 -
Mitigate threats using Microsoft 365 Defender
Video Name Time 1. Threat Protection with Microsoft 365 Defender 14:00 2. Incidents in Microsoft 365 Defender 52:00 3. Remediate risks with Microsoft Defender for O365 19:00 4. Microsoft Defender for Identity 15:00 5. Azure AD Identity Protection 20:00 6. Micrososft Defender for Cloud Apps 22:00 7. Respond to DLP Alerts 16:00 8. Manage Insider Risk Management in Microsoft 365 19:00 -
Mitigate threats using Microsoft Defender for Endpoint
Video Name Time 1. Protect against threats with Microsoft Defender for Endpoint 9:00 2. Deploy the Microsft Defender for Endpoint environment 17:00 3. Implement Windows Security Enhancements 11:00 4. Device Investigations 23:00 5. Perform actions on a device 21:00 6. Perform evidence and entities investigations 11:00 7. Configure and manage automation 11:00 8. Configure alerts and detections 12:00 9. Threat and Vulnerability Management 16:00 -
Mitigate threats using Microsoft Defender for Cloud
Video Name Time 1. Plan for cloud workload protections using Microsoft Defender for Cloud 22:00 2. Cloud workload protections in Microsoft Defender for Cloud 38:00 3. Connect Azure Assets To Microsoft Defender for Cloud 17:00 4. Connect non-Azure resources to Microsoft Defender for Cloud 17:00 5. Security Alerts in Microsoft Defender for Cloud 26:00 -
Kusto Query Language queries for Microsoft Sentinel
Video Name Time 1. Construct KQL statements for Microsoft Sentinel 34:00 2. Analyze query results 16:00 3. Build Multi-Table queries in KQL 11:00 4. Work with string data using KQL 11:00 -
Configure Microsoft Sentinel
Video Name Time 1. Microsoft Sentinel Overview 16:00 2. Create and Manage Microsoft Sentinel workspaces 18:00 3. Query logs in Microsoft Sentinel 7:00 4. Use Watchlists in Microsoft Sentinel 8:00 5. Use Threat Intelligence in Microsoft Sentinel 11:00 -
Connect logs to Microsoft Sentinel
Video Name Time 1. Connect Data to Microsoft Sentinel using Data Connectors 13:00 2. Connect Microsoft 365 Defender to Microsoft Sentinel 9:00 3. Connect Microsoft Services to Microsoft Sentinel 5:00 4. Connect Windows Hosts to Microsoft Sentinel 7:00 5. Connect CEF logs to Microsoft Sentinel 6:00 6. Connect Syslog data to Microsoft Sentinel 5:00 7. Connect Threat Indicators to Microsoft Sentinel 6:00 -
Detections and investigations using Microsoft Sentinel
Video Name Time 1. Threat Detection with Microsoft Sentinel Analytics 22:00 2. Security Incident managent in Microsoft Sentinel 16:00 3. Threat Response with Microsoft Sentinel Playbooks 26:00 4. Entity Behaviour Analytics in Microsoft Sentinel 12:00 5. Workbooks in Microsoft Sentinel 10:00 -
Threat Hunting in Microsoft Sentinel
Video Name Time 1. Threat Hunting Concepts in Microsoft Sentinel 10:00 2. Threat Hunting with Microsoft Sentinel 11:00 3. Notebooks in Microsoft Sentinel 11:00
Add Comment