Learn how to secure your web applications with Microsoft security solutions. This course will teach you how to detect and respond to cyberattacks. Enroll now!Read more.
i, I'm Fabrice Chrzanowski, founder of the fluctuationit.com platform I have been passionate about new computer technologies for more than 30 years. I use all the new technologies to allow you to access your knowledge with ease.
Only want this course? Buy this course for
$199 $29 and keep lifetime access.
About This Course
Who this course is for:
- Security Operations Analyst
- M365 administrator
What you’ll learn:
- What is Microsoft Defender
- What is Azure identity protection
- Kusto Query Language (KQL)
- Investigation of incidents and alerts
- Detection of threat
- Insider risks
- Azure sentinel
- Microsoft 365 administration is a good start
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products.
Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.
Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.
Our Promise to You
By the end of this course, you will have learned web security operations.
10 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today!
|Section 1 - Introduction|
|Section 2 - Prepare For The Course|
|How To Prepare For This Training||00:00:00|
|Section 3 - Threat Detections|
|What Are Threats||00:00:00|
|Simulation Of An Attack||00:00:00|
|Section 4 - Microsoft 365 Defender For Cloud|
|How To Access MS Defender||00:00:00|
|Investigation Incidents And Alerts||00:00:00|
|Automated Investigation Air||00:00:00|
|Advanced Hunting With KQL||00:00:00|
|Section 5 - Azure Identity Protection|
|What Is Azure Identity Protection||00:00:00|
|Section 6 - Microsoft Defender For Office 365|
|Section 7 - Microsoft Defender For Identity|
|Protect Your On-Prem Assets With MS Defender For Identity||00:00:00|
|Section 8 - Microsoft Defender For Apps|
|What Is Defender For Cloud Apps||00:00:00|
|Section 9 - Data Loss Prevention (Overview)|
|What Is DLP||00:00:00|
|Section 10 - Microsoft Defender For Endpoint|
|What Is MS Defender For Endpoint||00:00:00|
|Onboard Device And Diags||00:00:00|
|Onboard Your First Device With Powershell Script||00:00:00|
|Run Attack On MDE||00:00:00|
|RBAC With MDE||00:00:00|
|ASR Rules And Advanced Protection||00:00:00|
|Deploy ASR With Intunes||00:00:00|
|Section 11 - Microsoft Defender For Cloud|
|What Is MS Defender For Cloud||00:00:00|
|Connect Your Assets||00:00:00|
|Connect Your No Azure Assets||00:00:00|
|Manage The Alerts||00:00:00|
|Enable MS Defender For Cloud||00:00:00|
|Section 12 - Kusto Query Language (KQL) Overview|
|How To Use Kusto Query Language (KQL)||00:00:00|
|Section 13 - Azure Sentinel|
|What Is Azure Sentinel||00:00:00|
|What Are Connectors||00:00:00|
|Add Azure VM To Sentinel||00:00:00|
|Add No Azure VM To Sentinel||00:00:00|
|Add No Linux VM To Sentinel||00:00:00|
|Add Logic App And Link To MS Teams||00:00:00|
|Create A Schedule Query Rule||00:00:00|
|Section 14 - The Exam|