Datum auswählen
Verfügbarkeit
12 Freie Plätze
Buchbar bis Sa. 21. Juni 2025, 15:00
Stornierbar bis Fr. 20. Juni 2025, 07:00
Programm
Mitigate threats using Microsoft Defender XDR
- Introduction to Microsoft Defender XDR threat protection
- Mitigate incidents using Microsoft Defender
- Manage Microsoft Entra Identity Protection
- Safeguard your environment with Microsoft Defender for Identity
- Remediate risks with Microsoft Defender for Office 365
- Secure your cloud apps and services with Microsoft Defender for Cloud Apps
Mitigate threats using Microsoft Copilot for Security
- Fundamentals of Geneerative AI
- Describe Microsoft Copilot for Security
- Describe the core features of Microsoft Copilot for Security
- Describe the embedded experineces of Microsoft Copilot for Security
- Explore use cases of Microsoft Copilot for Security
Mitigate threats using Microsoft Purview
- Respond to data loss prevention alerts using Microsoft 365
- Manage insider risk in Microsoft Purview
- Search and investigate with Microsoft Purview Audit
- Investigage threats with Content search in Microsoft Purview
Mitigate threats using Microsoft Defender for Endpoint
- Protect againts threats with Microsoft Defender for Endpoint
- Deploy the Microsoft Defender for Endpoint environment
- Impelement Windows security enhancements with Microsoft Defender for Endpoint
- Perform device investigations in Microsoft Defender for Endpoint
- Perform actions on a device using Microsoft Defender for Endpoints
- Perform evidence and entitites investigations using Microsogt Defender for Endpoint
- Configure and manage automation using Microsoft Defendr for Endpoint
- Configure for alerts and detections in Microsoft Defender for Endpoint
- Utilize Vulnerability Management in Microsoft Defender for Endpoint
Mitigate threats using Microsoft Defender for Cloud
- Plan for cloud workload protections using Microsoft Defender for Cloud
- Connect Azure assets to Microsoft Defender for Cloud
- Connect non-Azure resources to Microsoft Defender for Cloud
- Manage your cloud security posture management
- Explain cloud workload protections in Microsoft Defender for Cloud
- Remediate security alerts using Microsoft Defender for Cloud
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
- Construct KQL statements for Microsoft Sentinel
- Analyze query results sing KQL
- Build multi-table statements using KQL
- Work with data in Microsoft Sentinel using Kusto Query Language
Configure your Microsoft Sentinel environment
- Introduction to Microsoft Sentinel
- Create and manage Microsoft Sentinel workspaces
- Query logs in Microsoft Sentinel
- Use watchlists in Microsoft Sentinel
- Utilize threat intelligence in Microsoft Sentinel
Connect logs to Microsoft Sentinel
- Connect data to Microsoft Sentinel using data connectors
- Connect Microsoft services to Microsoft Sentinel
- Connect Microsoft Defender XDR to Microsoft Sentinel
- Connect Windows hosts to Microsoft Sentinel
- Connect Commen Event Format logs to Microsoft Sentinel
- Connect syslog data sources to Microsoft Sentinel
- Connect threat indicators to Microsoft Sentinel
Create detections and perform investigations using Microsoft Sentinel
- Threat detection with Microsoft Sentinel analytics
- Automation in Microsoft Sentinel
- Threat response with Microsoft Sentinel playbooks
- Security incident management in Microsoft Sentinel
- Identify threats with Behavioral Analytics
- Data normalization in Microsoft Sentinel
- Query, visualize, and monitor data in Microsoft Sentinel
- Mange content in Microsoft Sentinel
Perform threat hunting in Microsoft Sentinel
Explain threat hunting concepts in Microsoft Sentinel
Threat hunting with Microsoft Sentinel
Use Search jobs in Microsoft Sentinel
Hunt for threats using notebooks in Microsoft Sentinel
Ziele
Erfahren Sie, wie Sie mit Microsoft Sentinel, Microsoft Defender for Cloud und Microsoft 365 Defender Bedrohungen untersuchen, auf sie reagieren und sie aufspüren können. In diesem Kurs lernen Sie, wie Sie Cyberbedrohungen mithilfe dieser Technologien abwehren können. Insbesondere konfigurieren und verwenden Sie Microsoft Sentinel und nutzen Kusto Query Language (KQL) zur Erkennung, Analyse und Berichterstellung. Das Training richtet sich an Personen, die im Bereich Security Operations tätig sind, und hilft Teilnehmern bei der Vorbereitung auf die Prüfung SC-200: Microsoft Security Operations Analyst.
Voraussetzungen
- Grundkenntnisse über Microsoft 365
- Grundlegendes Verständnis über Microsoft-Produkte zu Sicherheit, Compliance und Identität
- Fortgeschrittene Kenntnisse über Microsoft Windows
- Vertrautheit mit Azure-Diensten, insbesondere Azure SQL-Datenbank und Azure Storage
- Kenntnisse im Umgang mit virtuellen Azure-Computern und virtuellen Netzwerken
- Grundlegendes Verständnis der Konzepte zur Skripterstellung.
Datum auswählen
Verfügbarkeit
12 Freie Plätze
Buchbar bis Sa. 21. Juni 2025, 15:00
Stornierbar bis Fr. 20. Juni 2025, 07:00
Verifiziert