Companies Home Search Profile

Microsoft Cloud Security and AI (Microsoft Azure)

Focused View

Kuljot Singh Bakshi

8:05:00

0 View
  • 1 -Course Introduction.mp4
    03:49
  • 1 -Birds Eye View of Security + AI.mp4
    11:53
  • 1 -major introduction exec summary.pptx
  • 1 -Section Introduction.mp4
    21:42
  • 1 -introduction.pptx
  • 2 -Caution Licensing!!!!!.mp4
    04:04
  • 3 -Introduction To Information Protection.mp4
    08:53
  • 3 -information protection sensitive labels.pptx
  • 4 -Information Protection Demo (Hands-On Lab).mp4
    24:15
  • 5 -Auto-Labelling Policies Theory Video.mp4
    08:35
  • 5 -auto labelling policies.pptx
  • 6 -Auto-Labelling Policies Demo (Hands-On Lab).mp4
    13:11
  • 7 -Data Encryption Theory Video.mp4
    11:00
  • 7 -data encryption with sensitivity labels.pptx
  • 8 -Data Encryption Demo Video (Hands-On Lab).mp4
    10:54
  • 9 -DLP policies.pptx
  • 9 -Data Loss Prevention Policies Theory Video.mp4
    09:00
  • 10 -Data Loss Prevention Policies Demo (Hands-On Lab).mp4
    20:58
  • 11 -Viewing Alerts and Incidents On Microsoft Defender Portal.mp4
    07:13
  • 12 -Endpoint Data Loss Prevention Theory Video.mp4
    11:37
  • 12 -endpoint DLP policies.pptx
  • 13 -Endpoint Data Loss Prevention Demo (Hands-On Lab).mp4
    31:14
  • 14 -Communication Compliance Theory Video.mp4
    08:00
  • 14 -communication compliance.pptx
  • 15 -Communication Compliance Demo Video (Hands-On Lab).mp4
    14:50
  • 16 -Insider Risk Management Theory Video.mp4
    30:08
  • 16 -insider risk management.pptx
  • 17 -Insider Risk Management Demo Video (Hands-On Lab).mp4
    21:11
  • 18 -eDiscovery MS Purview.pptx
  • 18 -eDiscovery Theory Video.mp4
    12:21
  • 19 -eDiscovery Demo Video (Hands-On Lab).mp4
    20:11
  • 20 -Data Lifecycle Management Theory Video.mp4
    16:52
  • 20 -data lifecycle management.pptx
  • 21 -Data Lifecycle Management Demo Video (Hands-On Lab).mp4
    12:31
  • 22 -AI Hub on MS Purview.mp4
    08:35
  • 1 -IAM introduction.pptx
  • 1 -What, Why and How of IAM (Identity and Access Management).mp4
    11:49
  • 2 -MFA.pptx
  • 2 -MFA (Multi-Factor Authentication) Theory.mp4
    06:51
  • 3 -Enforcing MFA Part1 (Demo).mp4
    10:12
  • 4 -Enforcing MFA Part2 (Demo).mp4
    04:49
  • 5 -Introduction to Conditional Access Policies.mp4
    06:55
  • 5 -conditional access.pptx
  • 6 -Creating a Conditional Access Policy (Demo).mp4
    13:23
  • 7 -Introduction To PIM (Privileged Identity Management).mp4
    05:19
  • 7 -PIM introduction.pptx
  • 8 -Enforcing PIM (Demo).mp4
    10:14
  • 9 -Introduction To Role-Based-Access-Control (RBAC).mp4
    05:17
  • 9 -RBAC introduction.pptx
  • 10 -Applying RBAC (Demo).mp4
    06:20
  • 11 -Introduction To Microsoft Entra ID managed VMs.mp4
    05:28
  • 11 -VMs with entra ID.pptx
  • 12 -Creating a Microsoft Entra Managed VM.mp4
    12:11
  • 13 -Introduction to Azure Key Vault.mp4
    11:32
  • 13 -azure key vault.pptx
  • 14 -Azure Key Vault Architecture.mp4
    03:30
  • 14 -key vault architecture.pptx
  • 15 -Implementing Azure Key Vault (Demo).mp4
    28:13
  • Description


    MS Purview, Entra ID,Microsoft Defender, Microsoft Sentinel, Intune, Azure OpenAI, Azure Cognitive Services

    What You'll Learn?


    • Securing Generative AI like Microsoft Copilot, ChatGPT
    • Securing Predictive AI
    • Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender
    • Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc.
    • Learn about Cloud Security Posture Management and Cloud Security Hygiene

    Who is this for?


  • Anyone looking to securely deploy AI into their organization
  • Security Analysts
  • AI Developers
  • SOC engineers
  • DevSecOps Engineers
  • What You Need to Know?


  • Intermediate experience with Microsoft Azure required
  • Intermediate experience with Microsoft Cloud , Office 365 etc. required
  • More details


    Description

    With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour.

    In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.


    The following Microsoft security solutions will be covered in this course:
    1) Microsoft Entra ID - Cloud-based identity and access management service for secure resource access.

    2)Microsoft Entra Conditional Access - Centralized policy control for authentication conditions and data/application security.

    3)Microsoft Defender for Identity - Detects on-premises identity attacks using behavioral analysis and specific threat detections.

    4)Intune - Cloud-based mobile device and application management service, integrates with Conditional Access for device security.

    5)Defender for Endpoint - Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.

    6)Defender for Cloud Apps - Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.

    7) Defender for Office 365 - Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.

    8) Defender for Cloud - Simplifies detection, automated investigation, and response for Azure resources.

    9) Microsoft Purview DLP - Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.

    10) Microsoft Purview Information Protection - Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.

    11) Intune Mobile App Management (MAM) - Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.

    12) Defender for Cloud Apps - Provides security capabilities for cloud applications.

    13) Microsoft Defender XDR provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.

    14) Microsoft Sentinel is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.

    Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time.

    Who this course is for:

    • Anyone looking to securely deploy AI into their organization
    • Security Analysts
    • AI Developers
    • SOC engineers
    • DevSecOps Engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Kuljot Singh Bakshi
    Kuljot Singh Bakshi
    Instructor's Courses
    Microsoft Certified Azure AI Engineer Associate Certification (AI-102) MVP (Most Valuable Professional)  at C#-Corner.Areas of interest include full stack development, cloud computing, Artificial Intelligence, Machine Learning and Microsoft Azure.Academic Credentials:First Year Undergrad At IIT (Indian Institute of Technology) Bombay at the Department of Environmental Science and Engineering, Batch of 2027. Cleared the prestigious IIT-JEE Advanced exam with an AIR (All India Rank) of 4377 out of 11 million aspirants in the first attempt itself. Made it to the top 100 out of nearly 10,000 students in the prestigious TCS IT WIZ Quiz that spans all across India.Author at c-sharp corner as well where my articles and videos primarily focus on Artificial Intelligence and Machine Learning
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 39
    • duration 8:05:00
    • Release Date 2025/03/07