وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Microsoft Defender for Cloud – From Zero to Hero

سرفصل های دوره

Learn Microsoft Defender for Cloud | Hands-on experience in your own free Azure environment | Elevate your cyber career


1. Introduction
  • 1. Welcome & About your Instructor
  • 2. Course Content
  • 3. FAQs.html

  • 2. SOC Basics
  • 1. Complexity and Cyber Security Challanges
  • 2. What is a SOC
  • 3. SOC Tier Model
  • 4. Cyber Security Incident Response Process
  • 5. EDR, XDR, SIEM & SOAR

  • 3. Azure Basics
  • 1. Cloud Types
  • 2. Shared Responsibility Model
  • 3. Azure Resource Hierarchy

  • 4. Microsoft Security Basics
  • 1. Defender for Cloud in the Microsoft Security Cosmos
  • 2. Defending Across Attack Chains

  • 5. Overview on Defender for Cloud
  • 1. What is Microsoft Defender for Cloud
  • 2. CSPM & CWP
  • 3. Defender for Cloud RBAC

  • 6. Lab Setup
  • 1.1 Download VirtualBox.html
  • 1. Demo Install VirtualBox
  • 2.1 Download Kali Linux.html
  • 2. Demo Install Kali Linux
  • 3. Demo Configure Kali Keyboard Layout
  • 4. Demo Install Tor Browser in Kali
  • 5. Demo Create Resource Group
  • 6. Demo Setup Log Analytics Workspace
  • 7. Demo Enable All Plans in Defender for Cloud
  • 8. Demo Enable Defender for Cloud on Log Analytics
  • 9. Demo Create Virtual Machines
  • 10. Demo Create a Storage Account
  • 11. Demo Create a SQL Database
  • 12. Demo Create an AKS Cluster
  • 13. Demo Create an Azure Key Vault

  • 7. Azure Policy
  • 1. Azure Policy Overview
  • 2. Azure Policy Effects
  • 3. Azure Resource Manager & Azure Policy Engine
  • 4. Demo Azure Policy

  • 8. Azure Arc
  • 1. Azure Arc

  • 9. Log Analytics & KQL
  • 1. KQL 101
  • 2. Log Analytics Dedicated Cluster

  • 10. CSPM - Foundational CSPM
  • 1. What is CSPM
  • 2. CSPM Plans
  • 3. Asset Inventory
  • 4. Demo Asset Inventory
  • 5. Security Recommendations
  • 6. Demo Security Recommendations
  • 7. Secure Score
  • 8. Demo Secure Score
  • 9. Azure Workbooks
  • 10. Demo Azure Workbooks in Defender for Cloud
  • 11. Data Exporting
  • 12. Demo Data Exporting
  • 13. Remediation
  • 14. Demo Remediation
  • 15. Microsoft Cloud Security Benchmark
  • 16. Demo Microsoft Cloud Security Benchmark

  • 11. CSPM - Defender CSPM
  • 1. Governance Management
  • 2. Demo Governance Management
  • 3. Regulatory Compliance
  • 4. Demo Regulatory Compliance
  • 5. Cloud Security Explorer
  • 6. Demo Cloud Security Explorer
  • 7. Attack Path Analysis
  • 8. Agentless Vulnerability Scanning
  • 9. Agentless Discovery for Kubernetes
  • 10. Container Registry Vulnerability Assessment
  • 11. Data Aware Security Posture
  • 12. EASM Insights in Network Exposure
  • 13. DevOps Security

  • 12. CWP Overview
  • 1. What is CWP
  • 2. Alert Queue
  • 3. Demo Alert Queue
  • 4. Demo Create Sample Alerts
  • 5. Demo Create Suppression Rules
  • 6. Demo Setup Email Notifications

  • 13. CWP - Defender for Servers Overview
  • 1. What is Defender for Servers
  • 2. Agents
  • 3. Plans

  • 14. CWP - Defender for Servers P1
  • 1. Defender for Endpoint Integration
  • 2. Licensing
  • 3. Defender for Endpoint Provisioning
  • 4. Threat Detection for OS-Level
  • 5. Alerts for Windows Machines
  • 6. Alerts for Linux Machines
  • 7. Demo Brute Force SSH

  • 15. CWP - Defender for Servers P2
  • 1. Threat Detection for Network Level
  • 2. Qualys Vulnerability Assessment
  • 3. Adaptive Application Controls
  • 4. Demo Adaptive Application Controls
  • 5. Free Data Ingestion to Log Analytics Workspaces
  • 6. Free Azure Update Manager Remediation for Arc machines
  • 7. Just-in-time VM access
  • 8. Demo Just-in-time VM access
  • 9. Adaptive Network Hardening
  • 10. File Integrity Monitoring
  • 11. Demo File Integrity Monitoring
  • 12. Network Map
  • 13. Demo Network Map

  • 16. CWP - Defender for App Service
  • 1. Overview

  • 17. CWP - Defender for Databases
  • 1. Overview
  • 2. Defender for SQL Databases
  • 3. Defender for Open-Source Relational Databases
  • 4. Defender for Cosmos DB

  • 18. CWP - Defender for Storage
  • 1. Overview
  • 2. Demo Defender for Storage

  • 19. CWP - Defender for Containers
  • 1. Overview
  • 2. Environment Hardening
  • 3. Vulnerability Assessment
  • 4. Threat Protection
  • 5. Demo Defender for Containers

  • 20. CWP - Defender for Key Vault
  • 1. Overview
  • 2. Demo Defender for Key Vault

  • 21. CWP - Defender for Resource Manager
  • 1. Overview
  • 2. Demo Defender for Resource Manager

  • 22. CWP - Defender for APIs
  • 1. Overview

  • 23. Automation
  • 1. Workflow Automation
  • 2. Azure Logic Apps
  • 3.1 Exploit DB.html
  • 3.2 Setting up response to Malware Scanning.html
  • 3. Demo Malware Scanning Response with Workflow Automation & Azure Logic Apps

  • 24. Integration
  • 1. Integration with Sentinel
  • 2. Integration with other SIEMs
  • 3. Integration with Defender for IoT
  • 4. Integration with Azure Web Application Firewall
  • 5. Integration with Azure DDoS Protection Standard

  • 25. Additional Topics
  • 1. Community
  • 2. Azure Lighthouse
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 32455
    حجم: 1786 مگابایت
    مدت زمان: 293 دقیقه
    تاریخ انتشار: ۶ فروردین ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید