Companies Home Search Profile

Microsoft Defender for Cloud - From Zero to Hero

Focused View

Christopher Nett

4:52:09

9 View
  • 1. Welcome & About your Instructor.mp4
    00:33
  • 2. Course Content.mp4
    02:45
  • 3. FAQs.html
  • 1. Complexity and Cyber Security Challanges.mp4
    06:54
  • 2. What is a SOC.mp4
    04:07
  • 3. SOC Tier Model.mp4
    02:44
  • 4. Cyber Security Incident Response Process.mp4
    02:33
  • 5. EDR, XDR, SIEM & SOAR.mp4
    02:40
  • 1. Cloud Types.mp4
    01:55
  • 2. Shared Responsibility Model.mp4
    03:07
  • 3. Azure Resource Hierarchy.mp4
    02:13
  • 1. Defender for Cloud in the Microsoft Security Cosmos.mp4
    04:44
  • 2. Defending Across Attack Chains.mp4
    04:23
  • 1. What is Microsoft Defender for Cloud.mp4
    02:48
  • 2. CSPM & CWP.mp4
    02:24
  • 3. Defender for Cloud RBAC.mp4
    01:58
  • 1.1 Download VirtualBox.html
  • 1. Demo Install VirtualBox.mp4
    01:05
  • 2.1 Download Kali Linux.html
  • 2. Demo Install Kali Linux.mp4
    03:21
  • 3. Demo Configure Kali Keyboard Layout.mp4
    01:03
  • 4. Demo Install Tor Browser in Kali.mp4
    01:30
  • 5. Demo Create Resource Group.mp4
    00:54
  • 6. Demo Setup Log Analytics Workspace.mp4
    01:13
  • 7. Demo Enable All Plans in Defender for Cloud.mp4
    03:23
  • 8. Demo Enable Defender for Cloud on Log Analytics.mp4
    00:38
  • 9. Demo Create Virtual Machines.mp4
    04:10
  • 10. Demo Create a Storage Account.mp4
    02:07
  • 11. Demo Create a SQL Database.mp4
    01:32
  • 12. Demo Create an AKS Cluster.mp4
    01:17
  • 13. Demo Create an Azure Key Vault.mp4
    00:51
  • 1. Azure Policy Overview.mp4
    03:16
  • 2. Azure Policy Effects.mp4
    02:43
  • 3. Azure Resource Manager & Azure Policy Engine.mp4
    02:39
  • 4. Demo Azure Policy.mp4
    01:50
  • 1. Azure Arc.mp4
    02:21
  • 1. KQL 101.mp4
    09:51
  • 2. Log Analytics Dedicated Cluster.mp4
    02:19
  • 1. What is CSPM.mp4
    01:32
  • 2. CSPM Plans.mp4
    01:55
  • 3. Asset Inventory.mp4
    01:15
  • 4. Demo Asset Inventory.mp4
    04:08
  • 5. Security Recommendations.mp4
    01:07
  • 6. Demo Security Recommendations.mp4
    02:07
  • 7. Secure Score.mp4
    01:31
  • 8. Demo Secure Score.mp4
    01:25
  • 9. Azure Workbooks.mp4
    01:13
  • 10. Demo Azure Workbooks in Defender for Cloud.mp4
    02:32
  • 11. Data Exporting.mp4
    01:19
  • 12. Demo Data Exporting.mp4
    02:57
  • 13. Remediation.mp4
    02:36
  • 14. Demo Remediation.mp4
    02:53
  • 15. Microsoft Cloud Security Benchmark.mp4
    01:18
  • 16. Demo Microsoft Cloud Security Benchmark.mp4
    02:33
  • 1. Governance Management.mp4
    01:05
  • 2. Demo Governance Management.mp4
    02:37
  • 3. Regulatory Compliance.mp4
    02:05
  • 4. Demo Regulatory Compliance.mp4
    05:33
  • 5. Cloud Security Explorer.mp4
    01:25
  • 6. Demo Cloud Security Explorer.mp4
    02:53
  • 7. Attack Path Analysis.mp4
    01:21
  • 8. Agentless Vulnerability Scanning.mp4
    02:10
  • 9. Agentless Discovery for Kubernetes.mp4
    01:07
  • 10. Container Registry Vulnerability Assessment.mp4
    00:58
  • 11. Data Aware Security Posture.mp4
    01:02
  • 12. EASM Insights in Network Exposure.mp4
    01:05
  • 13. DevOps Security.mp4
    03:14
  • 1. What is CWP.mp4
    01:35
  • 2. Alert Queue.mp4
    01:18
  • 3. Demo Alert Queue.mp4
    03:03
  • 4. Demo Create Sample Alerts.mp4
    01:46
  • 5. Demo Create Suppression Rules.mp4
    03:08
  • 6. Demo Setup Email Notifications.mp4
    01:50
  • 1. What is Defender for Servers.mp4
    03:01
  • 2. Agents.mp4
    01:53
  • 3. Plans.mp4
    01:05
  • 1. Defender for Endpoint Integration.mp4
    01:47
  • 2. Licensing.mp4
    01:23
  • 3. Defender for Endpoint Provisioning.mp4
    00:53
  • 4. Threat Detection for OS-Level.mp4
    01:40
  • 5. Alerts for Windows Machines.mp4
    02:39
  • 6. Alerts for Linux Machines.mp4
    02:19
  • 7. Demo Brute Force SSH.mp4
    10:08
  • 1. Threat Detection for Network Level.mp4
    02:43
  • 2. Qualys Vulnerability Assessment.mp4
    02:02
  • 3. Adaptive Application Controls.mp4
    01:48
  • 4. Demo Adaptive Application Controls.mp4
    02:36
  • 5. Free Data Ingestion to Log Analytics Workspaces.mp4
    02:16
  • 6. Free Azure Update Manager Remediation for Arc machines.mp4
    00:35
  • 7. Just-in-time VM access.mp4
    03:09
  • 8. Demo Just-in-time VM access.mp4
    03:56
  • 9. Adaptive Network Hardening.mp4
    01:15
  • 10. File Integrity Monitoring.mp4
    02:00
  • 11. Demo File Integrity Monitoring.mp4
    01:47
  • 12. Network Map.mp4
    00:58
  • 13. Demo Network Map.mp4
    02:57
  • 1. Overview.mp4
    01:18
  • 1. Overview.mp4
    01:51
  • 2. Defender for SQL Databases.mp4
    01:16
  • 3. Defender for Open-Source Relational Databases.mp4
    00:58
  • 4. Defender for Cosmos DB.mp4
    00:51
  • 1. Overview.mp4
    04:01
  • 2. Demo Defender for Storage.mp4
    06:13
  • 1. Overview.mp4
    05:14
  • 2. Environment Hardening.mp4
    02:23
  • 3. Vulnerability Assessment.mp4
    02:52
  • 4. Threat Protection.mp4
    01:24
  • 5. Demo Defender for Containers.mp4
    02:28
  • 1. Overview.mp4
    03:20
  • 2. Demo Defender for Key Vault.mp4
    01:38
  • 1. Overview.mp4
    02:39
  • 2. Demo Defender for Resource Manager.mp4
    03:19
  • 1. Overview.mp4
    02:10
  • 1. Workflow Automation.mp4
    01:21
  • 2. Azure Logic Apps.mp4
    04:47
  • 3.1 Exploit DB.html
  • 3.2 Setting up response to Malware Scanning.html
  • 3. Demo Malware Scanning Response with Workflow Automation & Azure Logic Apps.mp4
    07:00
  • 1. Integration with Sentinel.mp4
    01:12
  • 2. Integration with other SIEMs.mp4
    00:28
  • 3. Integration with Defender for IoT.mp4
    03:09
  • 4. Integration with Azure Web Application Firewall.mp4
    01:55
  • 5. Integration with Azure DDoS Protection Standard.mp4
    01:12
  • 1. Community.mp4
    04:51
  • 2. Azure Lighthouse.mp4
    02:02
  • Description


    Learn Microsoft Defender for Cloud | Hands-on experience in your own free Azure environment | Elevate your cyber career

    What You'll Learn?


    • Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security
    • SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response
    • Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security
    • Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security
    • Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure
    • CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture
    • Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices
    • Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection
    • Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data
    • Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels
    • Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment
    • Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases
    • Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage
    • Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security
    • Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault
    • Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender
    • Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs
    • Automation: Streamline security processes through automation to improve efficiency and responsiveness
    • Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management
    • Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem
    • Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall
    • Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard
    • Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments
    • Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support

    Who is this for?


  • SOC Analyst
  • Security Engineer
  • Security Consultant
  • Security Architect
  • Security Manager
  • Cloud Engineer
  • Cloud Architect
  • IT Manager
  • What You Need to Know?


  • Basic IT Knowledge
  • No Azure or Cyber Security experience necessary
  • Willingness to learn cool stuff!
  • More details


    Description

    Microsoft Defender for Cloud - From Zero to Hero, is a carefully curated Udemy course designed for IT professionals aspiring to excel in Microsoft Defender for Cloud, enhancing their capabilities in cloud security posture management and cloud workload protection. This comprehensive course guides you methodically from the initial configuration to advanced implementation, incorporating practical, real-world scenarios.

    Acquiring expertise in Microsoft Defender for Cloud, formerly known as Azure Security Center, equips you with the skills to navigate a premier Cloud Native Application Protection Platform (CNAPP), essential in today's cybersecurity and cloud security landscape.

    Key Benefits for you:

    1. Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security.

    2. SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response.

    3. Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security.

    4. Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security.

    5. Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure.

    6. Azure Log Analytics: Harness the power of log analytics to gather actionable insights and enhance security monitoring.

    7. CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture.

    8. Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices.

    9. Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection.

    10. Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data.

    11. Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels.

    12. Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment.

    13. Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases.

    14. Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage.

    15. Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security.

    16. Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault.

    17. Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender.

    18. Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs.

    19. Automation: Streamline security processes through automation to improve efficiency and responsiveness.

    20. Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management.

    21. Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem.

    22. Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall.

    23. Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard.

    24. Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments.

    25. Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support.

    Who this course is for:

    • SOC Analyst
    • Security Engineer
    • Security Consultant
    • Security Architect
    • Security Manager
    • Cloud Engineer
    • Cloud Architect
    • IT Manager

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Christopher Nett
    Christopher Nett
    Instructor's Courses
    Christopher is security cloud solutions architect at Microsoft.Christopher has over 9 years of experience in cyber security, where he has advised some of the largest enterprises in the world on multi-million dollar projects.Education:★ MSc. Applied IT Security★ MBA★ BSc. Computer Science for BusinessCertifications:★ CISSP : Certified Information Systems Security Professional★ CCSP: Certified Cloud Security Professional★ CEH : Certified Ethical Hacker★ AZ-104: Azure Administrator Associate★ AZ-500: Azure Security Engineer Associate★ AZ-700: Azure Network Engineer Associate★ SC-100: Cybersecurity Architect Expert★ SC-200: Security Operations Analyst Associate★ SC-300: Identity and Access Administrator Associate★ KCNA: Kubernetes and Cloud Native Associate★ CKAD: Certified Kubernetes Application Developer★ CKA: Certified Kubernetes Administrator★ ATT&CK® Security Operations Center Assessment Certification★ ATT&CK Purple Teaming Methodology Certification★ ATT&CK® Adversary Emulation Methodology Certification★ ATT&CK® Cyber Threat Intelligence Certification★ HashiCorp Certified: Terraform Associate (002)★ Professional Scrum Master I★ Professional Scrum Product Owner I★ AWS Certified Security – Specialty★ AWS Certified Solutions Architect – Associate★ CCSK - Certificate of Cloud Security Knowledge
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 120
    • duration 4:52:09
    • Release Date 2024/03/12

    Courses related to Network Security

    Courses related to Information Security