Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Microsoft Defender For Cloud - From Zero To Hero

    Posted By: ELK1nG
    Microsoft Defender For Cloud - From Zero To Hero

    Microsoft Defender For Cloud - From Zero To Hero
    Published 12/2023
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.10 GB | Duration: 4h 51m

    Learn Microsoft Defender for Cloud | Hands-on experience in your own free Azure environment | Elevate your cyber career

    What you'll learn

    Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security

    SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response

    Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security

    Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security

    Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure

    CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture

    Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices

    Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection

    Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data

    Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels

    Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment

    Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases

    Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage

    Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security

    Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault

    Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender

    Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs

    Automation: Streamline security processes through automation to improve efficiency and responsiveness

    Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management

    Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem

    Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall

    Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard

    Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments

    Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support

    Requirements

    Basic IT Knowledge

    No Azure or Cyber Security experience necessary

    Willingness to learn cool stuff!

    Description

    Microsoft Defender for Cloud - From Zero to Hero, is a carefully curated Udemy course designed for IT professionals aspiring to excel in Microsoft Defender for Cloud, enhancing their capabilities in cloud security posture management and cloud workload protection. This comprehensive course guides you methodically from the initial configuration to advanced implementation, incorporating practical, real-world scenarios.Acquiring expertise in Microsoft Defender for Cloud, formerly known as Azure Security Center, equips you with the skills to navigate a premier Cloud Native Application Protection Platform (CNAPP), essential in today's cybersecurity and cloud security landscape.Key Benefits for you: Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security.SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response.Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security.Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security.Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure.Azure Log Analytics: Harness the power of log analytics to gather actionable insights and enhance security monitoring.CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture.Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices.Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection.Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data.Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels.Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment.Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases.Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage.Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security.Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault.Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender.Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs.Automation: Streamline security processes through automation to improve efficiency and responsiveness.Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management.Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem.Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall.Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard.Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments.Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support.

    Overview

    Section 1: Introduction

    Lecture 1 Welcome & About your Instructor

    Lecture 2 Course Content

    Lecture 3 FAQs

    Section 2: SOC Basics

    Lecture 4 Complexity and Cyber Security Challanges

    Lecture 5 What is a SOC?

    Lecture 6 SOC Tier Model

    Lecture 7 Cyber Security Incident Response Process

    Lecture 8 EDR, XDR, SIEM & SOAR

    Section 3: Azure Basics

    Lecture 9 Cloud Types

    Lecture 10 Shared Responsibility Model

    Lecture 11 Azure Resource Hierarchy

    Section 4: Microsoft Security Basics

    Lecture 12 Defender for Cloud in the Microsoft Security Cosmos

    Lecture 13 Defending Across Attack Chains

    Section 5: Overview on Defender for Cloud

    Lecture 14 What is Microsoft Defender for Cloud?

    Lecture 15 CSPM & CWP

    Lecture 16 Defender for Cloud RBAC

    Section 6: Lab Setup

    Lecture 17 Demo: Install VirtualBox

    Lecture 18 Demo: Install Kali Linux

    Lecture 19 Demo: Configure Kali Keyboard Layout

    Lecture 20 Demo: Install Tor Browser in Kali

    Lecture 21 Demo: Create Resource Group

    Lecture 22 Demo: Setup Log Analytics Workspace

    Lecture 23 Demo: Enable All Plans in Defender for Cloud

    Lecture 24 Demo: Enable Defender for Cloud on Log Analytics

    Lecture 25 Demo: Create Virtual Machines

    Lecture 26 Demo: Create a Storage Account

    Lecture 27 Demo: Create a SQL Database

    Lecture 28 Demo: Create an AKS Cluster

    Lecture 29 Demo: Create an Azure Key Vault

    Section 7: Azure Policy

    Lecture 30 Azure Policy Overview

    Lecture 31 Azure Policy Effects

    Lecture 32 Azure Resource Manager & Azure Policy Engine

    Lecture 33 Demo: Azure Policy

    Section 8: Azure Arc

    Lecture 34 Azure Arc

    Section 9: Log Analytics & KQL

    Lecture 35 KQL 101

    Lecture 36 Log Analytics Dedicated Cluster

    Section 10: CSPM - Foundational CSPM

    Lecture 37 What is CSPM?

    Lecture 38 CSPM Plans

    Lecture 39 Asset Inventory

    Lecture 40 Demo: Asset Inventory

    Lecture 41 Security Recommendations

    Lecture 42 Demo: Security Recommendations

    Lecture 43 Secure Score

    Lecture 44 Demo: Secure Score

    Lecture 45 Azure Workbooks

    Lecture 46 Demo: Azure Workbooks in Defender for Cloud

    Lecture 47 Data Exporting

    Lecture 48 Demo: Data Exporting

    Lecture 49 Remediation

    Lecture 50 Demo: Remediation

    Lecture 51 Microsoft Cloud Security Benchmark

    Lecture 52 Demo: Microsoft Cloud Security Benchmark

    Section 11: CSPM - Defender CSPM

    Lecture 53 Governance Management

    Lecture 54 Demo: Governance Management

    Lecture 55 Regulatory Compliance

    Lecture 56 Demo: Regulatory Compliance

    Lecture 57 Cloud Security Explorer

    Lecture 58 Demo: Cloud Security Explorer

    Lecture 59 Attack Path Analysis

    Lecture 60 Agentless Vulnerability Scanning

    Lecture 61 Agentless Discovery for Kubernetes

    Lecture 62 Container Registry Vulnerability Assessment

    Lecture 63 Data Aware Security Posture

    Lecture 64 EASM Insights in Network Exposure

    Lecture 65 DevOps Security

    Section 12: CWP Overview

    Lecture 66 What is CWP?

    Lecture 67 Alert Queue

    Lecture 68 Demo: Alert Queue

    Lecture 69 Demo: Create Sample Alerts

    Lecture 70 Demo: Create Suppression Rules

    Lecture 71 Demo: Setup Email Notifications

    Section 13: CWP - Defender for Servers Overview

    Lecture 72 What is Defender for Servers?

    Lecture 73 Agents

    Lecture 74 Plans

    Section 14: CWP - Defender for Servers P1

    Lecture 75 Defender for Endpoint Integration

    Lecture 76 Licensing

    Lecture 77 Defender for Endpoint Provisioning

    Lecture 78 Threat Detection for OS-Level

    Lecture 79 Alerts for Windows Machines

    Lecture 80 Alerts for Linux Machines

    Lecture 81 Demo: Brute Force SSH

    Section 15: CWP - Defender for Servers P2

    Lecture 82 Threat Detection for Network Level

    Lecture 83 Qualys Vulnerability Assessment

    Lecture 84 Adaptive Application Controls

    Lecture 85 Demo: Adaptive Application Controls

    Lecture 86 Free Data Ingestion to Log Analytics Workspaces

    Lecture 87 Free Azure Update Manager Remediation for Arc machines

    Lecture 88 Just-in-time VM access

    Lecture 89 Demo: Just-in-time VM access

    Lecture 90 Adaptive Network Hardening

    Lecture 91 File Integrity Monitoring

    Lecture 92 Demo: File Integrity Monitoring

    Lecture 93 Network Map

    Lecture 94 Demo: Network Map

    Section 16: CWP - Defender for App Service

    Lecture 95 Overview

    Section 17: CWP - Defender for Databases

    Lecture 96 Overview

    Lecture 97 Defender for SQL Databases

    Lecture 98 Defender for Open-Source Relational Databases

    Lecture 99 Defender for Cosmos DB

    Section 18: CWP - Defender for Storage

    Lecture 100 Overview

    Lecture 101 Demo: Defender for Storage

    Section 19: CWP - Defender for Containers

    Lecture 102 Overview

    Lecture 103 Environment Hardening

    Lecture 104 Vulnerability Assessment

    Lecture 105 Threat Protection

    Lecture 106 Demo: Defender for Containers

    Section 20: CWP - Defender for Key Vault

    Lecture 107 Overview

    Lecture 108 Demo: Defender for Key Vault

    Section 21: CWP - Defender for Resource Manager

    Lecture 109 Overview

    Lecture 110 Demo: Defender for Resource Manager

    Section 22: CWP - Defender for APIs

    Lecture 111 Overview

    Section 23: Automation

    Lecture 112 Workflow Automation

    Lecture 113 Azure Logic Apps

    Lecture 114 Demo: Malware Scanning Response with Workflow Automation & Azure Logic Apps

    Section 24: Integration

    Lecture 115 Integration with Sentinel

    Lecture 116 Integration with other SIEMs

    Lecture 117 Integration with Defender for IoT

    Lecture 118 Integration with Azure Web Application Firewall

    Lecture 119 Integration with Azure DDoS Protection Standard

    Section 25: Additional Topics

    Lecture 120 Community

    Lecture 121 Azure Lighthouse

    SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,Cloud Engineer,Cloud Architect,IT Manager