Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Record 4 of 6
Results Page:  Previous Next

Title SC-200 : Microsoft security operations analyst, [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : Packt Publishing, [2022]
QR Code
Description 1 online resource (1 video file (13 hr., 2 min.)) : sound, color.
Playing Time 130200
Description digital rdatr
video file rdaft
Instructional films lcgft
Performer Anand Rao Nednur, presenter.
Note "Updated in June 2022."
Summary Learn to implement Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats. About This Video Identify vulnerabilities on your devices with Microsoft Defender for Endpoint Explain how Microsoft Defender for Endpoint can remediate risks in your environment Describe threat and vulnerability management in Microsoft Defender for Endpoint In Detail The Microsoft security operations analyst works with organizational stakeholders to secure the organization's information technology systems. Its mission is to reduce corporate risk by quickly resolving active attacks in the environment, advising on threat protection practices, and reporting policy violations to the proper stakeholders. Threat management, monitoring, and response using a variety of security technologies across their environment are among their responsibilities. Using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security tools, the position primarily investigates, responds to, and hunts for threats. The security operations analyst is a key stakeholder in the configuration and implementation of these technologies as they consume the operational output of these solutions. This course starts by mitigating threats using Microsoft 365 Defender following which we will move on to module 2: mitigate threats using Microsoft Defender for Endpoint and module 3: mitigate threats using Azure Defender. Module 4 is all about creating queries for Azure Sentinel using Kusto query language whilst module 5 will be based on Microsoft Sentinel environment - configuration. Furthermore, module 6 will be about the Microsoft Sentinel environment - connecting logs. Post which, we will understand module 7 Microsoft Sentinel environment - incidents, threat response, UEBA, and monitoring. We will be wrapping up the course by understanding how to perform threat hunting with Microsoft Sentinel, which will be our 8th module. By the end of the course, you will gain the requisite knowledge and confidence to pass the SC-200: Microsoft Security Operations Analyst Exam. Audience This course is for participants aspiring for an SC-200 Certification. This is designed for everyone who aspires to work in the modern age SOC environment and for anyone who wants to learn the M365 defender suite of services. A basic understanding of Microsoft 365 and foundational knowledge of computer networking will be beneficial.
Subject Computer security -- Examinations -- Study guides.
Electronic data processing personnel -- Certification -- Study guides.
Sécurité informatique -- Examens -- Guides de l'étudiant.
Computer security -- Examinations
Electronic data processing personnel -- Certification
Genre Instructional films
Internet videos
Nonfiction films
Study guides
Instructional films.
Nonfiction films.
Internet videos.
Films de formation.
Films autres que de fiction.
Vidéos sur Internet.
Added Author Nednur, Anand Rao, presenter.
Packt Publishing, publisher.
ISBN 9781804611777 (electronic video)
1804611778 (electronic video)
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information