Sc-200 - Microsoft Security Operations Analyst by Christopher Nett

Photo unavailable
Category:
Date:
01/11/24 at 6:14pm GMT+1
Submitter:
Seeders:
9
Leechers:
1
File size:
2.1 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
bf1c1c9e18ab3093273332aa08e4310f4c6c1a32


File list

  • Sc-200 - Microsoft Security Operations Analyst by Christopher Nett
  • icon ~Get Your Files Here !/1 - Introduction/1 - Welcome About your Instructor.mp4 12.4 MB
    icon ~Get Your Files Here !/1 - Introduction/2 - Course Content SC200 Exam.mp4 1.5 MB
    icon ~Get Your Files Here !/1 - Introduction/3 - FAQs.html 702 B
    icon ~Get Your Files Here !/1 - Introduction/4 - IMPORTANT Defender M365 is now Defender XDR.html 257 B
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/68 - Overview.mp4 11.3 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/69 - Typical data sources for a SIEM.mp4 7.4 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/70 - Demo Content Hub.mp4 21.8 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/71 - Demo Ingesting Threat Intelligence into Sentinel.mp4 21.9 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/72 - Demo Verify Threat Intelligence Log Ingestion.mp4 6.5 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/73 - Demo Ingesting Entra ID into Sentinel.mp4 10 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/74 - Demo Deploy Sentinel Training Lab.mp4 7.8 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/75 - AMA and DCR.mp4 9.1 MB
    icon ~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/76 - Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4 37.1 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/77 - Sentinel Workflow.mp4 7.8 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/78 - Analytic rules.mp4 4 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/79 - Demo Analytic Rules.mp4 11.6 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/80 - Scheduled Analytic Rules.mp4 2.6 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/81 - Demo Scheduled Analytic Rules Entra ID.mp4 20.1 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/82 - Demo Scheduled Analytic Rules Windows Security Events.mp4 12.6 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/83 - NearRealTimeRules NRT.mp4 2 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/84 - Demo NearRealTimeRules NRT.mp4 15.5 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/85 - Fusion.mp4 3.8 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/86 - Demo Fusion.mp4 21.6 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/87 - ML Behavior Analytics.mp4 6.3 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/88 - Demo ML Behavior Analytics.mp4 10 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/89 - Threat Intelligence Rules.mp4 2.3 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/90 - Demo Threat Intelligence Rules.mp4 6.7 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/91 - Microsoft Security Rules.mp4 1.7 MB
    icon ~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/92 - Demo Microsoft Security Rules.mp4 4.2 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/100 - Demo Playbook with MITRE ATTCK ChatGPT.mp4 36.7 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/101 - Sentinel REST API.mp4 4.1 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/93 - Automation Capabilities in Sentinel.mp4 7.9 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/94 - Automation rules.mp4 1.6 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/95 - Demo Automation rules.mp4 1.7 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/96 - Playbooks.mp4 2.4 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/97 - Automation rules vs Playbooks.mp4 5.2 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/98 - Azure Logic Apps.mp4 8.6 MB
    icon ~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/99 - Demo Playbooks Azure Logic Apps.mp4 34.8 MB
    icon ~Get Your Files Here !/13 - Sentinel Manage Microsoft Sentinel incidents/102 - Demo Incident Dashboard.mp4 89.2 MB
    icon ~Get Your Files Here !/14 - Sentinel Use Microsoft Sentinel workbooks to analyze and interpret data/103 - Workbooks in Sentinel.mp4 1.6 MB
    icon ~Get Your Files Here !/14 - Sentinel Use Microsoft Sentinel workbooks to analyze and interpret data/104 - Demo Create Workbooks.mp4 32.2 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/105 - Overview on MITRE ATTCK.mp4 12.6 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/106 - Demo MITRE ATTCK.mp4 91.8 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/107 - Demo ATTCK in Sentinel.mp4 37.6 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/108 - What is Threat Hunting.mp4 7 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/109 - KQL 101.mp4 29.3 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/110 - Demo KQL 101.mp4 53.2 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/111 - Demo Threat Hunting in Sentinel.mp4 12.2 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/112 - Demo Hunt for Entra ID Events.mp4 33.3 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/113 - Notebooks.mp4 4.3 MB
    icon ~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/114 - Demo Notebooks with MSTICPy.mp4 197.9 MB
    icon ~Get Your Files Here !/16 - Sentinel Manage threats by using entity behavior analytics/115 - UEBA in Sentinel.mp4 9.8 MB
    icon ~Get Your Files Here !/16 - Sentinel Manage threats by using entity behavior analytics/116 - Demo UEBA in Sentinel.mp4 35.5 MB
    icon ~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/117 - What is XDR.mp4 4 MB
    icon ~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/118 - Demo Manage Incidents and Alerts.mp4 21.3 MB
    icon ~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/119 - Demo Secure Score.mp4 11.9 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/120 - What is Defender for Office 365.mp4 2.8 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/121 - Defender for Office 365 Edge Protection.mp4 5.8 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/122 - Defender for Office 365 Sender Intelligence.mp4 10.6 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/123 - Defender for Office 365 Content Filtering.mp4 9.4 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/124 - Defender for Office 365 Post Delivery Protection.mp4 7.2 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/125 - Demo Preset Security Policies.mp4 22.3 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/126 - Demo AntiPhishing Policy.mp4 28.4 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/127 - Demo AntiSpam Policy.mp4 25 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/128 - Demo AntiMalware Policy.mp4 8.8 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/129 - Demo Safe Attachments.mp4 10.1 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/130 - Demo Safe Links.mp4 12.1 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/131 - Demo Tenant AllowBlock Lists.mp4 6.2 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/132 - What is Defender for Cloud Apps.mp4 7.6 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/133 - Demo Cloud App Catalog.mp4 69.5 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/134 - Demo Cloud App Policies.mp4 17.6 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/135 - Purview.txt 33 B
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/135 - What is Microsoft Purview.mp4 4.7 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/136 - Demo Data Loss Prevention Policies.mp4 25.4 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/136 - Purview.txt 33 B
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/137 - Demo Insider Risk Policies.mp4 23.6 MB
    icon ~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/137 - Purview.txt 33 B
    icon ~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/138 - What is Defender for Endpoint.mp4 5.9 MB
    icon ~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/139 - Demo Management and Administration.mp4 86.8 MB
    icon ~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/140 - Demo Vulnerability Management.mp4 24.1 MB
    icon ~Get Your Files Here !/2 - SOC Basics/5 - Complexity and Cyber Security Challenges.mp4 16.2 MB
    icon ~Get Your Files Here !/2 - SOC Basics/6 - What is a SOC.mp4 10 MB
    icon ~Get Your Files Here !/2 - SOC Basics/7 - SOC Tier Model.mp4 8 MB
    icon ~Get Your Files Here !/2 - SOC Basics/8 - Cyber Security Incident Reponse Process.mp4 5.7 MB
    icon ~Get Your Files Here !/2 - SOC Basics/9 - EDR XDR SIEM SOAR.mp4 8.3 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/141 - Identities are the new security perimeter.mp4 2.4 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/142 - NTLM.mp4 13 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/143 - PasstheHash Attacks.mp4 6.5 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/144 - Kerberos.mp4 8.7 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/145 - PassTheTicket Attacks.mp4 3.8 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/146 - Brute Force Attacks.mp4 8.3 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/147 - Remote Code Execution Attacks.mp4 4.4 MB
    icon ~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/148 - What is Defender for Identity.mp4 11.3 MB
    icon ~Get Your Files Here !/3 - Azure Basics/10 - Cloud Types.mp4 5.7 MB
    icon ~Get Your Files Here !/3 - Azure Basics/11 - Shared Responsibility Model.mp4 7.7 MB
    icon ~Get Your Files Here !/3 - Azure Basics/12 - Azure Resource Hierarchy.mp4 5.2 MB
    icon ~Get Your Files Here !/4 - Microsoft Security Basics/13 - The Microsoft Security Cosmos.mp4 15.4 MB
    icon ~Get Your Files Here !/4 - Microsoft Security Basics/14 - Defending Across Attack Chains.mp4 27.2 MB

Similar Torrents