Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Microsoft Security Operations Analyst (Soc Enginner)

    Posted By: ELK1nG
    Microsoft Security Operations Analyst (Soc Enginner)

    Microsoft Security Operations Analyst (Soc Enginner)
    Published 1/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 5.50 GB | Duration: 8h 54m

    Microsoft SOC engineer Today. Learn Alerts, Incident, Ms defender for endpoint, Office 365, Sentinel, Cloud and KQL…

    What you'll learn

    What is Microsoft defender for Endpoint (MDE)

    What is Microsoft defender for Office 365

    What is Microsoft defender for identity

    What is Microsoft defender for Cloud

    What is Azure identity protection

    Learn KQL

    Investigation incidents and alerts

    Detection of threat

    Insider risks

    Qzure sentinel

    Requirements

    Microsoft 365 administration is a good start

    Description

    The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.What will be cover in this course : Introduction to Microsoft 365 threat protectionMitigate incidents using Microsoft 365 DefenderProtect your identities with Azure AD Identity ProtectionRemediate risks with Microsoft Defender for Office 365Safeguard your environment with Microsoft Defender for IdentitySecure your cloud apps and services with Microsoft Defender for Cloud AppsRespond to data loss prevention alerts using Microsoft 365Manage insider risk in Microsoft PurviewProtect against threats with Microsoft Defender for EndpointDeploy the Microsoft Defender for Endpoint environmentImplement Windows security enhancements with Microsoft Defender for EndpointPerform device investigations in Microsoft Defender for EndpointPerform actions on a device using Microsoft Defender for EndpointPerform evidence and entities investigations using Microsoft Defender for EndpointConfigure and manage automation using Microsoft Defender for EndpointConfigure for alerts and detections in Microsoft Defender for EndpointUtilize Vulnerability Management in Microsoft Defender for EndpointPlan for cloud workload protections using Microsoft Defender for CloudConnect Azure assets to Microsoft Defender for CloudConnect non-Azure resources to Microsoft Defender for CloudManage your cloud security posture managementExplain cloud workload protections in Microsoft Defender for CloudRemediate security alerts using Microsoft Defender for CloudConstruct KQL statements for Microsoft SentinelAnalyze query results using KQLBuild multi-table statements using KQLWork with data in Microsoft Sentinel using Kusto Query LanguageIntroduction to Microsoft SentinelCreate and manage Microsoft Sentinel workspacesQuery logs in Microsoft SentinelUse watchlists in Microsoft SentinelUtilize threat intelligence in Microsoft SentinelConnect data to Microsoft Sentinel using data connectorsConnect Microsoft services to Microsoft SentinelConnect Microsoft 365 Defender to Microsoft SentinelConnect Windows hosts to Microsoft SentinelConnect Common Event Format logs to Microsoft SentinelConnect syslog data sources to Microsoft SentinelConnect threat indicators to Microsoft Sentinel Threat detection with Microsoft Sentinel analyticsAutomation in Microsoft SentinelThreat response with Microsoft Sentinel playbooksSecurity incident management in Microsoft SentinelIdentify threats with Behavioral AnalyticsData normalization in Microsoft SentinelQuery, visualize, and monitor data in Microsoft SentinelManage content in Microsoft SentinelExplain threat hunting concepts in Microsoft SentinelThreat hunting with Microsoft SentinelUse Search jobs in Microsoft SentinelHunt for threats using notebooks in Microsoft SentinelAnd moreNice training !

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Preparation

    Lecture 2 How to prepare this training

    Lecture 3 License

    Section 3: Threat detections

    Lecture 4 What are Threat

    Lecture 5 Simulation presentation

    Section 4: Microsoft defender 365

    Lecture 6 How to access Ms defender

    Lecture 7 Investigation incidents and alerts

    Lecture 8 Manage alerts

    Lecture 9 Automated investigation AIR

    Lecture 10 Action center

    Lecture 11 Advanced hunting with KQL

    Section 5: Azure identity protection

    Lecture 12 What is Azure AD identity protection

    Section 6: Microsoft defender for Office 365

    Lecture 13 Defender for office 365 safe attachment

    Lecture 14 Defender for office 365 safe links

    Lecture 15 Defender for office 365 anti phishing

    Lecture 16 Defender for office 365 interactive presentation

    Section 7: Microsoft defender for indentity

    Lecture 17 Protect your on–prem assets with Ms defender for identity

    Section 8: Microsoft defender for Apps

    Lecture 18 Microsoft defender for cloud Apps (overview)

    Section 9: Data loss prevention (overview)

    Lecture 19 What is DLP

    Lecture 20 Insider risks

    Section 10: Microsoft defender for endpoint

    Lecture 21 What is Ms defender for endpoint

    Lecture 22 Onboard device and diags

    Lecture 23 Onboard your first device with Powershell script

    Lecture 24 Run attack on MDE

    Lecture 25 RBAC with MDE

    Lecture 26 Permissions

    Lecture 27 ASR Rules and advanced protection

    Lecture 28 Deploy ASR with intunes

    Section 11: Microsoft defender for cloud

    Lecture 29 What is MS defender for cloud

    Lecture 30 Interactive guide

    Lecture 31 Connect your assets

    Lecture 32 Connect your no azure assets

    Lecture 33 Manage the alerts

    Lecture 34 Enable Ms defender for cloud

    Section 12: Kusto Query Language (KQL) overview

    Lecture 35 How to use Kusto Query Language (KQL)

    Section 13: Azure sentinel

    Lecture 36 What is azure entinel

    Lecture 37 What are connectors

    Lecture 38 Add Azure VM to sentinel

    Lecture 39 Add no azure VM to sentinel

    Lecture 40 Add no linux VM to sentinel

    Lecture 41 Add logic app and link to ms teams

    Lecture 42 Create a schedule query rule

    Lecture 43 Enable UEBA

    Section 14: The exam

    Lecture 44 Some review questions

    Lecture 45 Others questions

    Security Operations Analyst,M365 administrator