1.1 Diagrams.pdf
1.2 PPT's.pdf
1. Slides and Diagrams download.html
2. How are we approaching this course
3. About this section
4. Zero Trust
5. Security - Integration endpoints
6. Cloud Adoption Framework
7. Security Strategy
8. Security Strategy - Hybrid environments
9. Security logging - tools
10. Let's start using the tools
11. Security logging - Our next steps
12. Security logging - Building a simple infrastructure
13. About Microsoft Sentinel
14. Lab - Microsoft Sentinel - Setup
15. Lab - Microsoft Sentinel - Data connectors
16. Lab - Microsoft Sentinel - Azure Activity
17. Lab - Microsoft Sentinel - Generating Incidents
18. Lab - Microsoft Sentinel - Generating Incidents - Resources.html
19. Incidents
20. Lab - Microsoft Sentinel - Virtual Machines - Incidents
21. Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources.html
22. Microsoft Sentinel - Workbooks
23. Microsoft Sentinel - Automation
24.1 Microsoft Sentinel - Threat Intelligence.html
24. Microsoft Sentinel - Note on threat protection
25.1 NSG Flow Logs.html
25. NSG Flow logs
26. Our next focus - Azure Active Directory
27.1 RBAC in-built roles.html
27. Review on Role-based access control
28. Identity Governance - Entitlement Management
29. Review of Application Objects
30. Example on using Application Objects
31. Installing the Postman tool.html
32.1 AuthApp.zip
32. Another example on Application Objects
33. Installing Visual Studio 2022.html
34. Enterprise Applications
35. Example on Enterprise Applications
36. Review - Azure AD Identity Protection
37. Review - Conditional Access Policies
38. Hybrid Identities - Azure AD Connect
39. Review - Azure AD Privileged Identity Management
40. Azure B2B
41. Azure B2C
42. Which service to choose
43. Azure AD Logs
44. Quick note before moving along
45. Section Quiz.html