وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Microsoft Defender for Cloud – From Zero to Hero

سرفصل های دوره

Learn Microsoft Defender for Cloud | Hands-on experience in your own free Azure environment | Elevate your cyber career


1. Introduction
  • 1. Welcome & About your Instructor
  • 2. Course Content
  • 3. FAQs.html

  • 2. SOC Basics
  • 1. Complexity and Cyber Security Challanges
  • 2. What is a SOC
  • 3. SOC Tier Model
  • 4. Cyber Security Incident Response Process
  • 5. EDR, XDR, SIEM & SOAR

  • 3. Azure Basics
  • 1. Cloud Types
  • 2. Shared Responsibility Model
  • 3. Azure Resource Hierarchy

  • 4. Microsoft Security Basics
  • 1. Defender for Cloud in the Microsoft Security Cosmos
  • 2. Defending Across Attack Chains

  • 5. Overview on Defender for Cloud
  • 1. What is Microsoft Defender for Cloud
  • 2. CSPM & CWP
  • 3. Defender for Cloud RBAC

  • 6. Lab Setup
  • 1.1 Download VirtualBox.html
  • 1. Demo Install VirtualBox
  • 2.1 Download Kali Linux.html
  • 2. Demo Install Kali Linux
  • 3. Demo Configure Kali Keyboard Layout
  • 4. Demo Install Tor Browser in Kali
  • 5. Demo Create Resource Group
  • 6. Demo Setup Log Analytics Workspace
  • 7. Demo Enable All Plans in Defender for Cloud
  • 8. Demo Enable Defender for Cloud on Log Analytics
  • 9. Demo Create Virtual Machines
  • 10. Demo Create a Storage Account
  • 11. Demo Create a SQL Database
  • 12. Demo Create an AKS Cluster
  • 13. Demo Create an Azure Key Vault

  • 7. Azure Policy
  • 1. Azure Policy Overview
  • 2. Azure Policy Effects
  • 3. Azure Resource Manager & Azure Policy Engine
  • 4. Demo Azure Policy

  • 8. Azure Arc
  • 1. Azure Arc

  • 9. Log Analytics & KQL
  • 1. KQL 101
  • 2. Log Analytics Dedicated Cluster

  • 10. CSPM - Foundational CSPM
  • 1. What is CSPM
  • 2. CSPM Plans
  • 3. Asset Inventory
  • 4. Demo Asset Inventory
  • 5. Security Recommendations
  • 6. Demo Security Recommendations
  • 7. Secure Score
  • 8. Demo Secure Score
  • 9. Azure Workbooks
  • 10. Demo Azure Workbooks in Defender for Cloud
  • 11. Data Exporting
  • 12. Demo Data Exporting
  • 13. Remediation
  • 14. Demo Remediation
  • 15. Microsoft Cloud Security Benchmark
  • 16. Demo Microsoft Cloud Security Benchmark

  • 11. CSPM - Defender CSPM
  • 1. Governance Management
  • 2. Demo Governance Management
  • 3. Regulatory Compliance
  • 4. Demo Regulatory Compliance
  • 5. Cloud Security Explorer
  • 6. Demo Cloud Security Explorer
  • 7. Attack Path Analysis
  • 8. Agentless Vulnerability Scanning
  • 9. Agentless Discovery for Kubernetes
  • 10. Container Registry Vulnerability Assessment
  • 11. Data Aware Security Posture
  • 12. EASM Insights in Network Exposure
  • 13. DevOps Security

  • 12. CWP Overview
  • 1. What is CWP
  • 2. Alert Queue
  • 3. Demo Alert Queue
  • 4. Demo Create Sample Alerts
  • 5. Demo Create Suppression Rules
  • 6. Demo Setup Email Notifications

  • 13. CWP - Defender for Servers Overview
  • 1. What is Defender for Servers
  • 2. Agents
  • 3. Plans

  • 14. CWP - Defender for Servers P1
  • 1. Defender for Endpoint Integration
  • 2. Licensing
  • 3. Defender for Endpoint Provisioning
  • 4. Threat Detection for OS-Level
  • 5. Alerts for Windows Machines
  • 6. Alerts for Linux Machines
  • 7. Demo Brute Force SSH

  • 15. CWP - Defender for Servers P2
  • 1. Threat Detection for Network Level
  • 2. Qualys Vulnerability Assessment
  • 3. Adaptive Application Controls
  • 4. Demo Adaptive Application Controls
  • 5. Free Data Ingestion to Log Analytics Workspaces
  • 6. Free Azure Update Manager Remediation for Arc machines
  • 7. Just-in-time VM access
  • 8. Demo Just-in-time VM access
  • 9. Adaptive Network Hardening
  • 10. File Integrity Monitoring
  • 11. Demo File Integrity Monitoring
  • 12. Network Map
  • 13. Demo Network Map

  • 16. CWP - Defender for App Service
  • 1. Overview

  • 17. CWP - Defender for Databases
  • 1. Overview
  • 2. Defender for SQL Databases
  • 3. Defender for Open-Source Relational Databases
  • 4. Defender for Cosmos DB

  • 18. CWP - Defender for Storage
  • 1. Overview
  • 2. Demo Defender for Storage

  • 19. CWP - Defender for Containers
  • 1. Overview
  • 2. Environment Hardening
  • 3. Vulnerability Assessment
  • 4. Threat Protection
  • 5. Demo Defender for Containers

  • 20. CWP - Defender for Key Vault
  • 1. Overview
  • 2. Demo Defender for Key Vault

  • 21. CWP - Defender for Resource Manager
  • 1. Overview
  • 2. Demo Defender for Resource Manager

  • 22. CWP - Defender for APIs
  • 1. Overview

  • 23. Automation
  • 1. Workflow Automation
  • 2. Azure Logic Apps
  • 3.1 Exploit DB.html
  • 3.2 Setting up response to Malware Scanning.html
  • 3. Demo Malware Scanning Response with Workflow Automation & Azure Logic Apps

  • 24. Integration
  • 1. Integration with Sentinel
  • 2. Integration with other SIEMs
  • 3. Integration with Defender for IoT
  • 4. Integration with Azure Web Application Firewall
  • 5. Integration with Azure DDoS Protection Standard

  • 25. Additional Topics
  • 1. Community
  • 2. Azure Lighthouse
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 32455
    حجم: 1786 مگابایت
    مدت زمان: 293 دقیقه
    تاریخ انتشار: 6 فروردین 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید