Cargando…

SC-200 : Microsoft security operations analyst,

Learn to implement Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. About This Video Identify vulnerabilities on your devices with Microsoft Defender for Endpoint Explain how Microsoft Defender for Endpoint can remediate risks in your environment Desc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1335125008
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220712s2022 xx 782 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF 
020 |a 9781804611777  |q (electronic video) 
020 |a 1804611778  |q (electronic video) 
029 1 |a AU@  |b 000072282734 
035 |a (OCoLC)1335125008 
037 |a 9781804611777  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8076  |2 23/eng/20220712 
049 |a UAMI 
245 0 0 |a SC-200 :  |b Microsoft security operations analyst, 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (13 hr., 2 min.)) :  |b sound, color. 
306 |a 130200 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Anand Rao Nednur, presenter. 
500 |a "Updated in June 2022." 
520 |a Learn to implement Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. About This Video Identify vulnerabilities on your devices with Microsoft Defender for Endpoint Explain how Microsoft Defender for Endpoint can remediate risks in your environment Describe threat and vulnerability management in Microsoft Defender for Endpoint In Detail The Microsoft security operations analyst works with organizational stakeholders to secure the organization's information technology systems. Its mission is to reduce corporate risk by quickly resolving active attacks in the environment, advising on threat protection practices, and reporting policy violations to the proper stakeholders. Threat management, monitoring, and response using a variety of security technologies across their environment are among their responsibilities. Using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security tools, the position primarily investigates, responds to, and hunts for threats. The security operations analyst is a key stakeholder in the configuration and implementation of these technologies as they consume the operational output of these solutions. This course starts by mitigating threats using Microsoft 365 Defender following which we will move on to module 2: mitigate threats using Microsoft Defender for Endpoint and module 3: mitigate threats using Azure Defender. Module 4 is all about creating queries for Azure Sentinel using Kusto query language whilst module 5 will be based on Microsoft Sentinel environment - configuration. Furthermore, module 6 will be about the Microsoft Sentinel environment - connecting logs. Post which, we will understand module 7 Microsoft Sentinel environment - incidents, threat response, UEBA, and monitoring. We will be wrapping up the course by understanding how to perform threat hunting with Microsoft Sentinel, which will be our 8th module. By the end of the course, you will gain the requisite knowledge and confidence to pass the SC-200: Microsoft Security Operations Analyst Exam. Audience This course is for participants aspiring for an SC-200 Certification. This is designed for everyone who aspires to work in the modern age SOC environment and for anyone who wants to learn the M365 defender suite of services. A basic understanding of Microsoft 365 and foundational knowledge of computer networking will be beneficial. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed July 12, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Electronic data processing personnel  |x Certification.  |2 fast  |0 (OCoLC)fst00907100 
655 7 |a Instructional films.  |2 fast  |0 (OCoLC)fst01726236 
655 7 |a Internet videos.  |2 fast  |0 (OCoLC)fst01750214 
655 7 |a Nonfiction films.  |2 fast  |0 (OCoLC)fst01710269 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Nednur, Anand Rao,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781804611777/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP