Security operations in Azure configuring and using Defender for 365 and Sentinel

Whether your company is already using Azure, thinking about moving to Azure, or trying to compare Azure to other providers or solutions, this training is for you. Microsoft Azure cloud service includes some powerful built-in cybersecurity tools that make it easy to secure an organization's data...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: O'Reilly (Firm), publisher (publisher)
Otros Autores: Hillard, Logan, instructor (instructor), Nathan, Jeremy, instructor
Formato: Vídeo online
Idioma:Inglés
Publicado: [Sebastopol, California] : O'Reilly Media, Inc [2024]
Edición:[First edition]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009843336006719
Descripción
Sumario:Whether your company is already using Azure, thinking about moving to Azure, or trying to compare Azure to other providers or solutions, this training is for you. Microsoft Azure cloud service includes some powerful built-in cybersecurity tools that make it easy to secure an organization's data and infrastructure. In this course, experts Jeremy Nathan and Logan Hillard show you the best ways to secure your assets using Microsoft Sentinel and Microsoft Defender for 365. They provide an unbiased assessment of the tools to help organizations determine if this is the best solution for your company as well as an understanding of how to set up these tools efficiently to prevent potential cybersecurity incidents. You will learn how to use Microsoft Defender to protect your enterprise environment and how to use it to perform incident response to see which assets were attacked. You will learn how to use Microsoft Sentinel to query security log data including user logins and assets to perform threat hunting against your environment.These tools give you and your team the ability to create a virtual security Operations Center (SOC) that is accessible anywhere in the world. You will also see a live attack with an analysis of the threat, remediation and how to prevent future attacks!
Descripción Física:1 online resource (1 video file (2 hr., 35 min.)) : sound, color