[ TutGee.Com ] Linkedin - Implementing And Administering Microsoft Sentinel

Torrent Details


[ TutGee.com ] Linkedin - Implementing and Administering Microsoft Sentinel

NAME
[ TutGee.com ] Linkedin - Implementing and Administering Microsoft Sentinel.torrent
CATEGORY
Other
INFOHASH
1eeac8ec78ca12ce45cb5917ad2f54dd7c6bb7f5
SIZE
858 MB in 42 files
ADDED
Uploaded on 02-02-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ FreeCourseWeb.com ] Implementing and Administering Microsoft Sentinel



If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com







LinkedIn Learning

Duration: 1h 38m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 858 MB

Genre: eLearning | Language: English



Microsoft Sentinel is a next-generation, cloud-native security event and information management (SEIM) system that provides real-time analysis of security alerts generated for your cloud and on-premises resources. By leveraging built-in machine learning from the security analytics experts at Microsoft, Sentinel effectively detects threats while automating threat response using orchestration and built-in or custom security playbooks. In this course, join Pete Zerger as he guides you through the implementation and configuration of Microsoft Sentinel. Discover how to connect key services and threat intelligence resources to Sentinel; investigate cases; create security playbooks to set automated threat responses to issues; and leverage search and query tools to hunt for threats.



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com



Get More Tutorials and Support Us -->> https://CourseWikia.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.en.srt1.9 KB
~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.mp49.2 MB
~Get Your Files Here !/1. Introduction/002. What you should know.en.srt1 KB
~Get Your Files Here !/1. Introduction/002. What you should know.mp45.8 MB
~Get Your Files Here !/1. Introduction/003. Lab setup.en.srt1.7 KB
~Get Your Files Here !/1. Introduction/003. Lab setup.mp49.1 MB
~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.en.srt7.3 KB
~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.mp440.4 MB
~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.en.srt6.4 KB
~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.mp438.4 MB
~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.en.srt11.1 KB
~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.mp470.3 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.en.srt6.8 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.mp440.6 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.en.srt9.1 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.mp448.6 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.en.srt11.3 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.mp464 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.en.srt14.3 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.mp476 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.en.srt8.9 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.mp447.9 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.en.srt13.4 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.mp473.1 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).en.srt9.4 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).mp451.8 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.en.srt12.7 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.mp467.2 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.en.srt7.6 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.mp442.6 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.en.srt5.4 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.mp430.5 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.en.srt10.7 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.mp457.4 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.en.srt9.2 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.mp450.5 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.en.srt5 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.mp427.9 MB
~Get Your Files Here !/6. Conclusion/020. Next steps.en.srt1.3 KB
~Get Your Files Here !/6. Conclusion/020. Next steps.mp46.7 MB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/Ex_Files_Implementing_Administering_Microsoft_Sentinel/Exercise Files/Additional Resources.pdf66.2 KB

Alternative Torrents for 'TutGee.com Linkedin Implementing and Administering Microsoft Sentinel'.

There are no alternative torrents found.