Companies Home Search Profile

Manage Security Operations

Focused View

2:50:35

14 View
    01 welcome
  • 01 course-introduction.en.txt
  • 01 course-introduction.mp4
    06:35
  • 02 how-to-be-successful-in-this-course instructions.html
    02 azure-monitor
  • 01 what-is-azure-monitor.en.txt
  • 01 what-is-azure-monitor.mp4
    06:43
  • 02 explore-azure-monitor.en.txt
  • 02 explore-azure-monitor.mp4
    08:29
  • 03 monitoring-options-available-in-azure instructions.html
  • 04 features-of-azure-monitor-logs instructions.html
  • 05 exercise-explore-azure-monitor instructions.html
  • 06 solution-explore-azure-monitor instructions.html
    03 configure-and-monitor-metrics-and-logs
  • 01 introduction-to-full-stack-monitoring-in-azure.en.txt
  • 01 introduction-to-full-stack-monitoring-in-azure.mp4
    08:09
  • 02 configure-and-monitor-metrics-and-logs.en.txt
  • 02 configure-and-monitor-metrics-and-logs.mp4
    08:30
  • 05 enable-log-analytics.en.txt
  • 05 enable-log-analytics.mp4
    05:09
  • 07 exercise-enable-log-analytics instructions.html
  • 08 solution-enable-log-analytics instructions.html
    04 azure-monitor-alerts
  • 01 responding-to-critical-situations.en.txt
  • 01 responding-to-critical-situations.mp4
    06:31
  • 02 enable-azure-monitor-alerts.en.txt
  • 02 enable-azure-monitor-alerts.mp4
    05:28
  • 03 configure-properties-for-diagnostic-logging.en.txt
  • 03 configure-properties-for-diagnostic-logging.mp4
    03:53
  • 04 demo-configure-properties-for-diagnostic-logging instructions.html
    05 graded-assessment-configure-and-manage-azure-monitor
  • 01 module-summary.en.txt
  • 01 module-summary.mp4
    07:18
    01 implement-microsoft-defender-for-cloud
  • 02 review-the-cyber-kill-chain.en.txt
  • 02 review-the-cyber-kill-chain.mp4
    05:03
  • 03 implement-microsoft-defender-for-cloud.mp4
    09:54
    02 microsoft-defender-for-cloud-policies-and-recommendations
    03 protect-against-brute-force-attacks
  • 01 what-are-brute-force-attacks.en.txt
  • 01 what-are-brute-force-attacks.mp4
    04:58
  • 03 implement-just-in-time-vm-access.en.txt
  • 03 implement-just-in-time-vm-access.mp4
    02:28
  • 07 understand-the-malware-threat.en.txt
  • 07 understand-the-malware-threat.mp4
    06:41
  • 08 configure-malware-detection instructions.html
    04 graded-assessment-enable-and-manage-microsoft-defender-for-cloud
    01 enable-and-configure-microsoft-sentinel
  • 01 what-is-microsoft-sentinel.en.txt
  • 01 what-is-microsoft-sentinel.mp4
    08:09
  • 02 how-does-microsoft-sentinel-work.en.txt
  • 02 how-does-microsoft-sentinel-work.mp4
    04:39
  • 04 enable-microsoft-sentinel instructions.html
  • 05 data-connections-in-microsoft-sentinel.en.txt
  • 05 data-connections-in-microsoft-sentinel.mp4
    04:17
    02 detect-threats-and-analyze-data
  • 01 visualize-microsoft-sentinel-data-using-workbooks.mp4
    07:49
  • 02 create-workbooks-to-explore-microsoft-sentinel-data.mp4
    03:39
  • 08 configure-playbooks-in-microsoft-sentinel.en.txt
  • 08 configure-playbooks-in-microsoft-sentinel.mp4
    05:05
    03 investigate-and-hunt-for-threats
  • 01 hunt-and-investigate-potential-breaches.en.txt
  • 01 hunt-and-investigate-potential-breaches.mp4
    06:49
  • 03 search-across-long-time-spans-in-large-datasets.en.txt
  • 03 search-across-long-time-spans-in-large-datasets.mp4
    04:15
  • 04 overview-of-threat-modeling.en.txt
  • 04 overview-of-threat-modeling.mp4
    05:14
  • 05 the-threat-modeling-process instructions.html
  • 06 use-the-threat-modeling-tool instructions.html
  • 07 features-of-the-threat-modeling-tool instructions.html
  • 08 exercise-investigate-threats instructions.html
  • 09 solution-investigate-threats instructions.html
  • 10 additional-resources-threat-modeling instructions.html
    04 graded-assessment-configure-and-monitor-microsoft-sentinel
  • 01 module-summary.en.txt
  • 01 module-summary.mp4
    06:07
    01 project
  • 01 course-summary.en.txt
  • 01 course-summary.mp4
    05:43
  • 02 about-the-course-project instructions.html
    02 graded-assessment-manage-security-operations
  • 01 about-the-graded-assessment.en.txt
  • 01 about-the-graded-assessment.mp4
    04:58
    03 course-wrap-up
  • 01 congratulations.en.txt
  • 01 congratulations.mp4
    01:57
  • 02 next-steps.en.txt
  • 02 next-steps.mp4
    06:05

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
  • language english
  • Training sessions 29
  • duration 2:50:35
  • English subtitles has
  • Release Date 2023/12/29