17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[ TutGee.com ] Linkedin - Implementing And Administering Microsoft Sentinel
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Microsoft Sentinel is a next-generation, cloud-native security event and information management (SEIM) system that provides real-time analysis of security alerts generated for your cloud and on-premises resources. By leveraging built-in machine learning from the security analytics experts at Microsoft, Sentinel effectively detects threats while automating threat response using orchestration and built-in or custom security playbooks. In this course, join Pete Zerger as he guides you through the implementation and configuration of Microsoft Sentinel. Discover how to connect key services and threat intelligence resources to Sentinel; investigate cases; create security playbooks to set automated threat responses to issues; and leverage search and query tools to hunt for threats.
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.en.srt
1.9 KB
~Get Your Files Here !/1. Introduction/001. Need a central point of analysis for security events.mp4
9.2 MB
~Get Your Files Here !/1. Introduction/002. What you should know.en.srt
1 KB
~Get Your Files Here !/1. Introduction/002. What you should know.mp4
5.8 MB
~Get Your Files Here !/1. Introduction/003. Lab setup.en.srt
1.7 KB
~Get Your Files Here !/1. Introduction/003. Lab setup.mp4
9.1 MB
~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.en.srt
7.3 KB
~Get Your Files Here !/2. Introduction and Concepts/004. Sentinel feature flyover.mp4
40.4 MB
~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.en.srt
6.4 KB
~Get Your Files Here !/2. Introduction and Concepts/005. Onboarding Microsoft Sentinel.mp4
38.4 MB
~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.en.srt
11.1 KB
~Get Your Files Here !/2. Introduction and Concepts/006. Kusto query language quickstart.mp4
70.3 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.en.srt
6.8 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/007. Connecting Microsoft services.mp4
40.6 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.en.srt
9.1 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/008. Connecting external services.mp4
48.6 MB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.en.srt
11.3 KB
~Get Your Files Here !/3. Configuring Microsoft Sentinel/009. Integrating threat intelligence.mp4
64 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.en.srt
14.3 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/010. Detecting threats.mp4
76 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.en.srt
8.9 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/011. Investigating incidents.mp4
47.9 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.en.srt
13.4 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/012. Responding to threats with playbooks.mp4
73.1 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).en.srt
9.4 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/013. Security orchestration, automation, and response (SOAR).mp4
51.8 MB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.en.srt
12.7 KB
~Get Your Files Here !/4. Threat Detection, Investigation, and Response/014. UEBA and machine learning.mp4
67.2 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.en.srt
7.6 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/015. Threat hunting basics.mp4
42.6 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.en.srt
5.4 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/016. Hunting with bookmarks.mp4
30.5 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.en.srt
10.7 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/017. Hunting with notebooks.mp4
57.4 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.en.srt
9.2 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/018. Workbooks and dashboards.mp4
50.5 MB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.en.srt
5 KB
~Get Your Files Here !/5. Advanced Threat Hunting Scenarios/019. Integrating with M365 Defender.mp4
27.9 MB
~Get Your Files Here !/6. Conclusion/020. Next steps.en.srt
1.3 KB
~Get Your Files Here !/6. Conclusion/020. Next steps.mp4
6.7 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_Implementing_Administering_Microsoft_Sentinel/Exercise Files/Additional Resources.pdf