وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Manage Security Operations

سرفصل های دوره

01 configure-and-manage-azure-monitor
    01 welcome
  • 01 course-introduction.en.txt
  • 01 course-introduction
  • 02 how-to-be-successful-in-this-course instructions.html
    02 azure-monitor
  • 01 what-is-azure-monitor.en.txt
  • 01 what-is-azure-monitor
  • 02 explore-azure-monitor.en.txt
  • 02 explore-azure-monitor
  • 03 monitoring-options-available-in-azure instructions.html
  • 04 features-of-azure-monitor-logs instructions.html
  • 05 exercise-explore-azure-monitor instructions.html
  • 06 solution-explore-azure-monitor instructions.html
    03 configure-and-monitor-metrics-and-logs
  • 01 introduction-to-full-stack-monitoring-in-azure.en.txt
  • 01 introduction-to-full-stack-monitoring-in-azure
  • 02 configure-and-monitor-metrics-and-logs.en.txt
  • 02 configure-and-monitor-metrics-and-logs
  • 05 enable-log-analytics.en.txt
  • 05 enable-log-analytics
  • 07 exercise-enable-log-analytics instructions.html
  • 08 solution-enable-log-analytics instructions.html
    04 azure-monitor-alerts
  • 01 responding-to-critical-situations.en.txt
  • 01 responding-to-critical-situations
  • 02 enable-azure-monitor-alerts.en.txt
  • 02 enable-azure-monitor-alerts
  • 03 configure-properties-for-diagnostic-logging.en.txt
  • 03 configure-properties-for-diagnostic-logging
  • 04 demo-configure-properties-for-diagnostic-logging instructions.html
    05 graded-assessment-configure-and-manage-azure-monitor
  • 01 module-summary.en.txt
  • 01 module-summary

02 enable-and-manage-microsoft-defender-for-cloud
    01 implement-microsoft-defender-for-cloud
  • 02 review-the-cyber-kill-chain.en.txt
  • 02 review-the-cyber-kill-chain
  • 03 implement-microsoft-defender-for-cloud
    02 microsoft-defender-for-cloud-policies-and-recommendations
    03 protect-against-brute-force-attacks
  • 01 what-are-brute-force-attacks.en.txt
  • 01 what-are-brute-force-attacks
  • 03 implement-just-in-time-vm-access.en.txt
  • 03 implement-just-in-time-vm-access
  • 07 understand-the-malware-threat.en.txt
  • 07 understand-the-malware-threat
  • 08 configure-malware-detection instructions.html
    04 graded-assessment-enable-and-manage-microsoft-defender-for-cloud

03 configure-and-monitor-microsoft-sentinel
    01 enable-and-configure-microsoft-sentinel
  • 01 what-is-microsoft-sentinel.en.txt
  • 01 what-is-microsoft-sentinel
  • 02 how-does-microsoft-sentinel-work.en.txt
  • 02 how-does-microsoft-sentinel-work
  • 04 enable-microsoft-sentinel instructions.html
  • 05 data-connections-in-microsoft-sentinel.en.txt
  • 05 data-connections-in-microsoft-sentinel
    02 detect-threats-and-analyze-data
  • 01 visualize-microsoft-sentinel-data-using-workbooks
  • 02 create-workbooks-to-explore-microsoft-sentinel-data
  • 08 configure-playbooks-in-microsoft-sentinel.en.txt
  • 08 configure-playbooks-in-microsoft-sentinel
    03 investigate-and-hunt-for-threats
  • 01 hunt-and-investigate-potential-breaches.en.txt
  • 01 hunt-and-investigate-potential-breaches
  • 03 search-across-long-time-spans-in-large-datasets.en.txt
  • 03 search-across-long-time-spans-in-large-datasets
  • 04 overview-of-threat-modeling.en.txt
  • 04 overview-of-threat-modeling
  • 05 the-threat-modeling-process instructions.html
  • 06 use-the-threat-modeling-tool instructions.html
  • 07 features-of-the-threat-modeling-tool instructions.html
  • 08 exercise-investigate-threats instructions.html
  • 09 solution-investigate-threats instructions.html
  • 10 additional-resources-threat-modeling instructions.html
    04 graded-assessment-configure-and-monitor-microsoft-sentinel
  • 01 module-summary.en.txt
  • 01 module-summary

04 project-and-graded-assessment
    01 project
  • 01 course-summary.en.txt
  • 01 course-summary
  • 02 about-the-course-project instructions.html
    02 graded-assessment-manage-security-operations
  • 01 about-the-graded-assessment.en.txt
  • 01 about-the-graded-assessment
    03 course-wrap-up
  • 01 congratulations.en.txt
  • 01 congratulations
  • 02 next-steps.en.txt
  • 02 next-steps
139,000 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
خرید دانلودی فوری

در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

ایمیل شما:
تولید کننده:
شناسه: 28221
حجم: 546 مگابایت
مدت زمان: 171 دقیقه
تاریخ انتشار: 20 دی 1402
دسته بندی محصول
طراحی سایت و خدمات سئو

139,000 تومان
افزودن به سبد خرید