Security + Ai (Microsoft Azure)
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.05 GB | Duration: 8h 5m
Published 9/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.05 GB | Duration: 8h 5m
MS Purview, Entrance ID,Microsoft Defender, Microsoft Sentinel, Intune, Azure OpenAI, Azure Cognitive Services
What you'll learn
Securing Generative AI like Microsoft Copilot, ChatGPT
Securing Predictive AI
Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender
Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc.
Learn about Cloud Security Posture Management and Cloud Security Hygiene
Requirements
Intermediate experience with Microsoft Azure required
Intermediate experience with Microsoft Cloud , Office 365 etc. required
Description
With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour. In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.The following Microsoft security solutions will be covered in this course:1) Microsoft Entra ID - Cloud-based identity and access management service for secure resource access.2)Microsoft Entra Conditional Access - Centralized policy control for authentication conditions and data/application security.3)Microsoft Defender for Identity - Detects on-premises identity attacks using behavioral analysis and specific threat detections.4)Intune - Cloud-based mobile device and application management service, integrates with Conditional Access for device security.5)Defender for Endpoint - Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.6)Defender for Cloud Apps - Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.7) Defender for Office 365 - Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.8) Defender for Cloud - Simplifies detection, automated investigation, and response for Azure resources.9) Microsoft Purview DLP - Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.10) Microsoft Purview Information Protection - Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.11) Intune Mobile App Management (MAM) - Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.12) Defender for Cloud Apps - Provides security capabilities for cloud applications.13) Microsoft Defender XDR provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.14) Microsoft Sentinel is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time.
Overview
Section 1: Introduction
Lecture 1 Course Introduction
Section 2: Bird's Eye View of Security + AI
Lecture 2 Bird's Eye View of Security + AI
Section 3: Securing AI with MS Purview (Information Protection and Governance)
Lecture 3 Section Introduction
Lecture 4 Caution: Licensing!!!!!
Lecture 5 Introduction To Information Protection
Lecture 6 Information Protection Demo (Hands-On Lab)
Lecture 7 Auto-Labelling Policies Theory Video
Lecture 8 Auto-Labelling Policies Demo (Hands-On Lab)
Lecture 9 Data Encryption Theory Video
Lecture 10 Data Encryption Demo Video (Hands-On Lab)
Lecture 11 Data Loss Prevention Policies Theory Video
Lecture 12 Data Loss Prevention Policies Demo (Hands-On Lab)
Lecture 13 Viewing Alerts and Incidents On Microsoft Defender Portal
Lecture 14 Endpoint Data Loss Prevention Theory Video
Lecture 15 Endpoint Data Loss Prevention Demo (Hands-On Lab)
Lecture 16 Communication Compliance Theory Video
Lecture 17 Communication Compliance Demo Video (Hands-On Lab)
Lecture 18 Insider Risk Management Theory Video
Lecture 19 Insider Risk Management Demo Video (Hands-On Lab)
Lecture 20 eDiscovery Theory Video
Lecture 21 eDiscovery Demo Video (Hands-On Lab)
Lecture 22 Data Lifecycle Management Theory Video
Lecture 23 Data Lifecycle Management Demo Video (Hands-On Lab)
Lecture 24 AI Hub on MS Purview
Section 4: Securing AI with IAM (Identity And Access Management)
Lecture 25 What, Why and How of IAM (Identity and Access Management)
Lecture 26 MFA (Multi-Factor Authentication) Theory
Lecture 27 Enforcing MFA Part1 (Demo)
Lecture 28 Enforcing MFA Part2 (Demo)
Lecture 29 Introduction to Conditional Access Policies
Lecture 30 Creating a Conditional Access Policy (Demo)
Lecture 31 Introduction To PIM (Privileged Identity Management)
Lecture 32 Enforcing PIM (Demo)
Lecture 33 Introduction To Role-Based-Access-Control (RBAC)
Lecture 34 Applying RBAC (Demo)
Lecture 35 Introduction To Microsoft Entra ID managed VMs
Lecture 36 Creating a Microsoft Entra Managed VM
Lecture 37 Introduction to Azure Key Vault
Lecture 38 Azure Key Vault Architecture
Lecture 39 Implementing Azure Key Vault (Demo)
Anyone looking to securely deploy AI into their organization,Security Analysts,AI Developers,SOC engineers,DevSecOps Engineers