وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

SC-200 Microsoft Security Operations Analyst by Christopher Nett

سرفصل های دوره

1 - Introduction
  • 1 - Welcome About your Instructor
  • 2 - Course Content SC200 Exam
  • 3 - FAQs.html
  • 4 - IMPORTANT Defender M365 is now Defender XDR.html

  • 2 - SOC Basics
  • 5 - Complexity and Cyber Security Challenges
  • 6 - What is a SOC
  • 7 - SOC Tier Model
  • 8 - Cyber Security Incident Reponse Process
  • 9 - EDR XDR SIEM SOAR

  • 3 - Azure Basics
  • 10 - Cloud Types
  • 11 - Shared Responsibility Model
  • 12 - Azure Resource Hierarchy

  • 4 - Microsoft Security Basics
  • 13 - The Microsoft Security Cosmos
  • 14 - Defending Across Attack Chains

  • 5 - Setup Lab Environment
  • 15 - Demo Install VirtualBox
  • 16 - Demo Configure Kali Keyboard Layout
  • 17 - Install Tor Browser on Kali
  • 18 - Deployment Prerequisites for Sentinel
  • 19 - Demo Create an Azure Resource Group for Sentinel
  • 20 - Demo Create a Log Analytics Workspace
  • 21 - Demo Create a Sentinel Workspace
  • 22 - Demo Create an Azure Resource Group for Defender for Cloud
  • 23 - Demo Enable All Plans in Defender for Cloud
  • 24 - Demo Create Virtual Machines
  • 25 - Demo Create a Storage Account
  • 26 - Demo Create a SQL Database
  • 27 - Demo Create an AKS Cluster
  • 28 - Demo Create an Azure Key Vault

  • 6 - Defender for Cloud Implement and maintain cloud security posture management
  • 29 - What is Microsoft Defender for Cloud
  • 30 - CSPM CWP
  • 31 - What is CSPM
  • 32 - CSPM Plans
  • 33 - Asset Inventory
  • 34 - Demo Asset Inventory
  • 35 - Security Recommendations
  • 36 - Demo Security Recommendations
  • 37 - Secure Score
  • 38 - Demo Secure Score
  • 39 - Remediation
  • 40 - Demo Remediation
  • 41 - DevOps Security
  • 42 - What is Defender for Servers
  • 43 - Agents
  • 44 - Threat Detection for OS Level
  • 45 - Alerts for Windows Machines
  • 46 - Alerts for Linux Machines
  • 47 - Demo Brute Force SSH

  • 7 - Defender for Cloud Configure environment settings in Defender for Cloud
  • 48 - Defender for Cloud RBAC
  • 49 - What is CWP
  • 50 - Defender for Databases
  • 51 - Defender for Storage
  • 52 - Demo Defender for Storage
  • 53 - Defender for Containers
  • 54 - Demo Defender for Containers
  • 55 - Defender for Key Vault
  • 56 - Demo Defender for Key Vault
  • 57 - Defender for Resource Manager
  • 58 - Demo Defender for Resource Manager
  • 59 - Azure Arc

  • 8 - Defender for Cloud Respond to alerts and incidents in Defender for Cloud
  • 60 - Demo Manage Alerts and Incidents
  • 61 - Email Notifications
  • 62 - Demo Create Suppression Rules
  • 63 - Workflow Automation
  • 64 - Demo Malware Scanning Response with Workflow Automation Azure Logic Apps
  • 65 - Demo Generate Sample Alerts

  • 9 - Sentinel Design and configure a Microsoft Sentinel workspace
  • 66 - Azure RBAC Sentinel
  • 67 - Demo Azure RBAC Sentinel

  • 10 - Sentinel Plan and implement the use of data connectors for ingestion
  • 68 - Overview
  • 69 - Typical data sources for a SIEM
  • 70 - Demo Content Hub
  • 71 - Demo Ingesting Threat Intelligence into Sentinel
  • 72 - Demo Verify Threat Intelligence Log Ingestion
  • 73 - Demo Ingesting Entra ID into Sentinel
  • 74 - Demo Deploy Sentinel Training Lab
  • 75 - AMA and DCR
  • 76 - Demo Ingesting Windows Security Event Logs with AMA and DCR

  • 11 - Sentinel Manage Microsoft Sentinel analytics rules
  • 77 - Sentinel Workflow
  • 78 - Analytic rules
  • 79 - Demo Analytic Rules
  • 80 - Scheduled Analytic Rules
  • 81 - Demo Scheduled Analytic Rules Entra ID
  • 82 - Demo Scheduled Analytic Rules Windows Security Events
  • 83 - NearRealTimeRules NRT
  • 84 - Demo NearRealTimeRules NRT
  • 85 - Fusion
  • 86 - Demo Fusion
  • 87 - ML Behavior Analytics
  • 88 - Demo ML Behavior Analytics
  • 89 - Threat Intelligence Rules
  • 90 - Demo Threat Intelligence Rules
  • 91 - Microsoft Security Rules
  • 92 - Demo Microsoft Security Rules

  • 12 - Sentinel Configure security orchestration automated response SOAR
  • 93 - Automation Capabilities in Sentinel
  • 94 - Automation rules
  • 95 - Demo Automation rules
  • 96 - Playbooks
  • 97 - Automation rules vs Playbooks
  • 98 - Azure Logic Apps
  • 99 - Demo Playbooks Azure Logic Apps
  • 100 - Demo Playbook with MITRE ATTCK ChatGPT
  • 101 - Sentinel REST API

  • 13 - Sentinel Manage Microsoft Sentinel incidents
  • 102 - Demo Incident Dashboard

  • 14 - Sentinel Use Microsoft Sentinel workbooks to analyze and interpret data
  • 103 - Workbooks in Sentinel
  • 104 - Demo Create Workbooks

  • 15 - Sentinel Hunt for threats by using Microsoft Sentinel
  • 105 - Overview on MITRE ATTCK
  • 106 - Demo MITRE ATTCK
  • 107 - Demo ATTCK in Sentinel
  • 108 - What is Threat Hunting
  • 109 - KQL 101
  • 110 - Demo KQL 101
  • 111 - Demo Threat Hunting in Sentinel
  • 112 - Demo Hunt for Entra ID Events
  • 113 - Notebooks
  • 114 - Demo Notebooks with MSTICPy

  • 16 - Sentinel Manage threats by using entity behavior analytics
  • 115 - UEBA in Sentinel
  • 116 - Demo UEBA in Sentinel

  • 17 - Defender XDR Manage extended detection and response XDR in Defender XDR
  • 117 - What is XDR
  • 118 - Demo Manage Incidents and Alerts
  • 119 - Demo Secure Score

  • 18 - Defender XDR Mitigate threats to the Microsoft 365 environment
  • 120 - What is Defender for Office 365
  • 121 - Defender for Office 365 Edge Protection
  • 122 - Defender for Office 365 Sender Intelligence
  • 123 - Defender for Office 365 Content Filtering
  • 124 - Defender for Office 365 Post Delivery Protection
  • 125 - Demo Preset Security Policies
  • 126 - Demo AntiPhishing Policy
  • 127 - Demo AntiSpam Policy
  • 128 - Demo AntiMalware Policy
  • 129 - Demo Safe Attachments
  • 130 - Demo Safe Links
  • 131 - Demo Tenant AllowBlock Lists
  • 132 - What is Defender for Cloud Apps
  • 133 - Demo Cloud App Catalog
  • 134 - Demo Cloud App Policies
  • 135 - Purview.txt
  • 135 - What is Microsoft Purview
  • 136 - Demo Data Loss Prevention Policies
  • 136 - Purview.txt
  • 137 - Demo Insider Risk Policies
  • 137 - Purview.txt

  • 19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint
  • 138 - What is Defender for Endpoint
  • 139 - Demo Management and Administration
  • 140 - Demo Vulnerability Management

  • 20 - Defender XDR Mitigate identity threats
  • 141 - Identities are the new security perimeter
  • 142 - NTLM
  • 143 - PasstheHash Attacks
  • 144 - Kerberos
  • 145 - PassTheTicket Attacks
  • 146 - Brute Force Attacks
  • 147 - Remote Code Execution Attacks
  • 148 - What is Defender for Identity
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 34715
    حجم: 2191 مگابایت
    مدت زمان: 493 دقیقه
    تاریخ انتشار: ۱۱ اردیبهشت ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید