Microsoft Security Operations Analyst (Soc Enginner)



Published 1/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.50 GB | Duration: 8h 54m
Microsoft SOC engineer Today. Learn Alerts, Incident, Ms defender for endpoint, Office 365, Sentinel, Cloud and KQL…


Microsoft SOC engineer Today. Learn Alerts, Incident, Ms defender for endpoint, Office 365, Sentinel, Cloud and KQL…
What you’ll learn
What is Microsoft defender for Endpoint (MDE)
What is Microsoft defender for Office 365
What is Microsoft defender for identity
What is Microsoft defender for Cloud
What is Azure identity protection
Learn KQL
Investigation incidents and alerts
Detection of threat
Insider risks
Qzure sentinel
Requirements
Microsoft 365 administration is a good start
Description
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.What will be cover in this course : Introduction to Microsoft 365 threat protectionMitigate incidents using Microsoft 365 DefenderProtect your identities with Azure AD Identity ProtectionRemediate risks with Microsoft Defender for Office 365Safeguard your environment with Microsoft Defender for IdentitySecure your cloud apps and services with Microsoft Defender for Cloud AppsRespond to data loss prevention alerts using Microsoft 365Manage insider risk in Microsoft PurviewProtect against threats with Microsoft Defender for EndpointDeploy the Microsoft Defender for Endpoint environmentImplement Windows security enhancements with Microsoft Defender for EndpointPerform device investigations in Microsoft Defender for EndpointPerform actions on a device using Microsoft Defender for EndpointPerform evidence and entities investigations using Microsoft Defender for EndpointConfigure and manage automation using Microsoft Defender for EndpointConfigure for alerts and detections in Microsoft Defender for EndpointUtilize Vulnerability Management in Microsoft Defender for EndpointPlan for cloud workload protections using Microsoft Defender for CloudConnect Azure assets to Microsoft Defender for CloudConnect non-Azure resources to Microsoft Defender for CloudManage your cloud security posture managementExplain cloud workload protections in Microsoft Defender for CloudRemediate security alerts using Microsoft Defender for CloudConstruct KQL statements for Microsoft SentinelAnalyze query results using KQLBuild multi-table statements using KQLWork with data in Microsoft Sentinel using Kusto Query LanguageIntroduction to Microsoft SentinelCreate and manage Microsoft Sentinel workspacesQuery logs in Microsoft SentinelUse watchlists in Microsoft SentinelUtilize threat intelligence in Microsoft SentinelConnect data to Microsoft Sentinel using data connectorsConnect Microsoft services to Microsoft SentinelConnect Microsoft 365 Defender to Microsoft SentinelConnect Windows hosts to Microsoft SentinelConnect Common Event Format logs to Microsoft SentinelConnect syslog data sources to Microsoft SentinelConnect threat indicators to Microsoft Sentinel Threat detection with Microsoft Sentinel analyticsAutomation in Microsoft SentinelThreat response with Microsoft Sentinel playbooksSecurity incident management in Microsoft SentinelIdentify threats with Behavioral AnalyticsData normalization in Microsoft SentinelQuery, visualize, and monitor data in Microsoft SentinelManage content in Microsoft SentinelExplain threat hunting concepts in Microsoft SentinelThreat hunting with Microsoft SentinelUse Search jobs in Microsoft SentinelHunt for threats using notebooks in Microsoft SentinelAnd moreNice training !
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Preparation
Lecture 2 How to prepare this training
Lecture 3 License
Section 3: Threat detections
Lecture 4 What are Threat
Lecture 5 Simulation presentation
Section 4: Microsoft defender 365
Lecture 6 How to access Ms defender
Lecture 7 Investigation incidents and alerts
Lecture 8 Manage alerts
Lecture 9 Automated investigation AIR
Lecture 10 Action center
Lecture 11 Advanced hunting with KQL
Section 5: Azure identity protection
Lecture 12 What is Azure AD identity protection
Section 6: Microsoft defender for Office 365
Lecture 13 Defender for office 365 safe attachment
Lecture 14 Defender for office 365 safe links
Lecture 15 Defender for office 365 anti phishing
Lecture 16 Defender for office 365 interactive presentation
Section 7: Microsoft defender for indentity
Lecture 17 Protect your on–prem assets with Ms defender for identity
Section 8: Microsoft defender for Apps
Lecture 18 Microsoft defender for cloud Apps (overview)
Section 9: Data loss prevention (overview)
Lecture 19 What is DLP
Lecture 20 Insider risks
Section 10: Microsoft defender for endpoint
Lecture 21 What is Ms defender for endpoint
Lecture 22 Onboard device and diags
Lecture 23 Onboard your first device with Powershell script
Lecture 24 Run attack on MDE
Lecture 25 RBAC with MDE
Lecture 26 Permissions
Lecture 27 ASR Rules and advanced protection
Lecture 28 Deploy ASR with intunes
Section 11: Microsoft defender for cloud
Lecture 29 What is MS defender for cloud
Lecture 30 Interactive guide
Lecture 31 Connect your assets
Lecture 32 Connect your no azure assets
Lecture 33 Manage the alerts
Lecture 34 Enable Ms defender for cloud
Section 12: Kusto Query Language (KQL) overview
Lecture 35 How to use Kusto Query Language (KQL)
Section 13: Azure sentinel
Lecture 36 What is azure entinel
Lecture 37 What are connectors
Lecture 38 Add Azure VM to sentinel
Lecture 39 Add no azure VM to sentinel
Lecture 40 Add no linux VM to sentinel
Lecture 41 Add logic app and link to ms teams
Lecture 42 Create a schedule query rule
Lecture 43 Enable UEBA
Section 14: The exam
Lecture 44 Some review questions
Lecture 45 Others questions
Security Operations Analyst,M365 administrator
https://www.udemy.com/course/microsoft-security-operations-analyst-soc-enginner/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

Download From 1DL
DOWNLOAD FROM 1DL.NET
DOWNLOAD FROM 1DL.NET
DOWNLOAD FROM 1DL.NET
DOWNLOAD FROM 1DL.NET
DOWNLOAD FROM 1DL.NET
DOWNLOAD FROM 1DL.NET

DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction