Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Security + Ai (Microsoft Azure)

    Posted By: ELK1nG
    Security + Ai (Microsoft Azure)

    Security + Ai (Microsoft Azure)
    Published 9/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 5.05 GB | Duration: 8h 5m

    MS Purview, Entrance ID,Microsoft Defender, Microsoft Sentinel, Intune, Azure OpenAI, Azure Cognitive Services

    What you'll learn

    Securing Generative AI like Microsoft Copilot, ChatGPT

    Securing Predictive AI

    Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender

    Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc.

    Learn about Cloud Security Posture Management and Cloud Security Hygiene

    Requirements

    Intermediate experience with Microsoft Azure required

    Intermediate experience with Microsoft Cloud , Office 365 etc. required

    Description

    With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour. In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.The following Microsoft security solutions will be covered in this course:1) Microsoft Entra ID - Cloud-based identity and access management service for secure resource access.2)Microsoft Entra Conditional Access - Centralized policy control for authentication conditions and data/application security.3)Microsoft Defender for Identity - Detects on-premises identity attacks using behavioral analysis and specific threat detections.4)Intune - Cloud-based mobile device and application management service, integrates with Conditional Access for device security.5)Defender for Endpoint - Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.6)Defender for Cloud Apps - Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.7) Defender for Office 365 - Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.8) Defender for Cloud - Simplifies detection, automated investigation, and response for Azure resources.9) Microsoft Purview DLP - Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.10) Microsoft Purview Information Protection - Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.11) Intune Mobile App Management (MAM) - Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.12) Defender for Cloud Apps - Provides security capabilities for cloud applications.13) Microsoft Defender XDR provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.14) Microsoft Sentinel is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time.

    Overview

    Section 1: Introduction

    Lecture 1 Course Introduction

    Section 2: Bird's Eye View of Security + AI

    Lecture 2 Bird's Eye View of Security + AI

    Section 3: Securing AI with MS Purview (Information Protection and Governance)

    Lecture 3 Section Introduction

    Lecture 4 Caution: Licensing!!!!!

    Lecture 5 Introduction To Information Protection

    Lecture 6 Information Protection Demo (Hands-On Lab)

    Lecture 7 Auto-Labelling Policies Theory Video

    Lecture 8 Auto-Labelling Policies Demo (Hands-On Lab)

    Lecture 9 Data Encryption Theory Video

    Lecture 10 Data Encryption Demo Video (Hands-On Lab)

    Lecture 11 Data Loss Prevention Policies Theory Video

    Lecture 12 Data Loss Prevention Policies Demo (Hands-On Lab)

    Lecture 13 Viewing Alerts and Incidents On Microsoft Defender Portal

    Lecture 14 Endpoint Data Loss Prevention Theory Video

    Lecture 15 Endpoint Data Loss Prevention Demo (Hands-On Lab)

    Lecture 16 Communication Compliance Theory Video

    Lecture 17 Communication Compliance Demo Video (Hands-On Lab)

    Lecture 18 Insider Risk Management Theory Video

    Lecture 19 Insider Risk Management Demo Video (Hands-On Lab)

    Lecture 20 eDiscovery Theory Video

    Lecture 21 eDiscovery Demo Video (Hands-On Lab)

    Lecture 22 Data Lifecycle Management Theory Video

    Lecture 23 Data Lifecycle Management Demo Video (Hands-On Lab)

    Lecture 24 AI Hub on MS Purview

    Section 4: Securing AI with IAM (Identity And Access Management)

    Lecture 25 What, Why and How of IAM (Identity and Access Management)

    Lecture 26 MFA (Multi-Factor Authentication) Theory

    Lecture 27 Enforcing MFA Part1 (Demo)

    Lecture 28 Enforcing MFA Part2 (Demo)

    Lecture 29 Introduction to Conditional Access Policies

    Lecture 30 Creating a Conditional Access Policy (Demo)

    Lecture 31 Introduction To PIM (Privileged Identity Management)

    Lecture 32 Enforcing PIM (Demo)

    Lecture 33 Introduction To Role-Based-Access-Control (RBAC)

    Lecture 34 Applying RBAC (Demo)

    Lecture 35 Introduction To Microsoft Entra ID managed VMs

    Lecture 36 Creating a Microsoft Entra Managed VM

    Lecture 37 Introduction to Azure Key Vault

    Lecture 38 Azure Key Vault Architecture

    Lecture 39 Implementing Azure Key Vault (Demo)

    Anyone looking to securely deploy AI into their organization,Security Analysts,AI Developers,SOC engineers,DevSecOps Engineers