Microsoft Defender For Cloud - From Zero To Hero
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.10 GB | Duration: 4h 51m
Published 12/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.10 GB | Duration: 4h 51m
Learn Microsoft Defender for Cloud | Hands-on experience in your own free Azure environment | Elevate your cyber career
What you'll learn
Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security
SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response
Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security
Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security
Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure
CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture
Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices
Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection
Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data
Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels
Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment
Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases
Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage
Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security
Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault
Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender
Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs
Automation: Streamline security processes through automation to improve efficiency and responsiveness
Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management
Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem
Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall
Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard
Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments
Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support
Requirements
Basic IT Knowledge
No Azure or Cyber Security experience necessary
Willingness to learn cool stuff!
Description
Microsoft Defender for Cloud - From Zero to Hero, is a carefully curated Udemy course designed for IT professionals aspiring to excel in Microsoft Defender for Cloud, enhancing their capabilities in cloud security posture management and cloud workload protection. This comprehensive course guides you methodically from the initial configuration to advanced implementation, incorporating practical, real-world scenarios.Acquiring expertise in Microsoft Defender for Cloud, formerly known as Azure Security Center, equips you with the skills to navigate a premier Cloud Native Application Protection Platform (CNAPP), essential in today's cybersecurity and cloud security landscape.Key Benefits for you: Overview on Defender for Cloud: Explore the features and capabilities of Microsoft Defender for Cloud for comprehensive cloud security.SOC Basics: Gain insights into Security Operations Center (SOC) principles for effective threat management and incident response.Azure Basics: Understand fundamental Azure concepts to establish a strong foundation for cloud security.Azure Policy: Learn how to enforce governance policies using Azure Policy to ensure compliance and security.Azure ARC: Discover the benefits of Azure Arc for extending Azure services and management to any infrastructure.Azure Log Analytics: Harness the power of log analytics to gather actionable insights and enhance security monitoring.CSPM (Cloud Security Posture Management): Implement CSPM to proactively manage and improve cloud security posture.Foundational CSPM: Establish a solid foundation in Cloud Security Posture Management for robust security practices.Defender CSPM: Leverage Defender CSPM for advanced cloud security posture management and threat detection.Cloud Workload Protection: Secure cloud workloads effectively to safeguard critical applications and data.Defender for Servers P1 and P2: Enhance server security with Microsoft Defender for Servers at both foundational and advanced levels.Defender for App Service: Protect your applications with Defender for App Service for a resilient and secure app environment.Defender for Databases: Safeguard databases against threats using Microsoft Defender for Databases.Defender for Storage: Ensure the security of your storage solutions with Microsoft Defender for Storage.Defender for Containers: Secure containerized environments with Microsoft Defender for Containers for enhanced container security.Defender for Key Vault: Safely manage and protect cryptographic keys and secrets with Defender for Key Vault.Defender for Resource Manager: Strengthen the security of Azure Resource Manager deployments with Defender.Defender for APIs: Protect APIs from threats and vulnerabilities using Microsoft Defender for APIs.Automation: Streamline security processes through automation to improve efficiency and responsiveness.Integration with Sentinel: Seamlessly integrate with Microsoft Sentinel for enhanced security information and event management.Integration with Defender for IoT: Enhance IoT security by integrating Microsoft Defender for IoT into your ecosystem.Integration with Azure WAF: Bolster web application security with seamless integration with Azure Web Application Firewall.Integration with Azure DDoS Protection Standard: Safeguard against DDoS attacks with integrated protection using Azure DDoS Protection Standard.Azure Lighthouse: Explore the advantages of Azure Lighthouse for simplified management across multiple Azure environments.Community: Join a vibrant community to share insights, best practices, and collaborate for ongoing learning and support.
Overview
Section 1: Introduction
Lecture 1 Welcome & About your Instructor
Lecture 2 Course Content
Lecture 3 FAQs
Section 2: SOC Basics
Lecture 4 Complexity and Cyber Security Challanges
Lecture 5 What is a SOC?
Lecture 6 SOC Tier Model
Lecture 7 Cyber Security Incident Response Process
Lecture 8 EDR, XDR, SIEM & SOAR
Section 3: Azure Basics
Lecture 9 Cloud Types
Lecture 10 Shared Responsibility Model
Lecture 11 Azure Resource Hierarchy
Section 4: Microsoft Security Basics
Lecture 12 Defender for Cloud in the Microsoft Security Cosmos
Lecture 13 Defending Across Attack Chains
Section 5: Overview on Defender for Cloud
Lecture 14 What is Microsoft Defender for Cloud?
Lecture 15 CSPM & CWP
Lecture 16 Defender for Cloud RBAC
Section 6: Lab Setup
Lecture 17 Demo: Install VirtualBox
Lecture 18 Demo: Install Kali Linux
Lecture 19 Demo: Configure Kali Keyboard Layout
Lecture 20 Demo: Install Tor Browser in Kali
Lecture 21 Demo: Create Resource Group
Lecture 22 Demo: Setup Log Analytics Workspace
Lecture 23 Demo: Enable All Plans in Defender for Cloud
Lecture 24 Demo: Enable Defender for Cloud on Log Analytics
Lecture 25 Demo: Create Virtual Machines
Lecture 26 Demo: Create a Storage Account
Lecture 27 Demo: Create a SQL Database
Lecture 28 Demo: Create an AKS Cluster
Lecture 29 Demo: Create an Azure Key Vault
Section 7: Azure Policy
Lecture 30 Azure Policy Overview
Lecture 31 Azure Policy Effects
Lecture 32 Azure Resource Manager & Azure Policy Engine
Lecture 33 Demo: Azure Policy
Section 8: Azure Arc
Lecture 34 Azure Arc
Section 9: Log Analytics & KQL
Lecture 35 KQL 101
Lecture 36 Log Analytics Dedicated Cluster
Section 10: CSPM - Foundational CSPM
Lecture 37 What is CSPM?
Lecture 38 CSPM Plans
Lecture 39 Asset Inventory
Lecture 40 Demo: Asset Inventory
Lecture 41 Security Recommendations
Lecture 42 Demo: Security Recommendations
Lecture 43 Secure Score
Lecture 44 Demo: Secure Score
Lecture 45 Azure Workbooks
Lecture 46 Demo: Azure Workbooks in Defender for Cloud
Lecture 47 Data Exporting
Lecture 48 Demo: Data Exporting
Lecture 49 Remediation
Lecture 50 Demo: Remediation
Lecture 51 Microsoft Cloud Security Benchmark
Lecture 52 Demo: Microsoft Cloud Security Benchmark
Section 11: CSPM - Defender CSPM
Lecture 53 Governance Management
Lecture 54 Demo: Governance Management
Lecture 55 Regulatory Compliance
Lecture 56 Demo: Regulatory Compliance
Lecture 57 Cloud Security Explorer
Lecture 58 Demo: Cloud Security Explorer
Lecture 59 Attack Path Analysis
Lecture 60 Agentless Vulnerability Scanning
Lecture 61 Agentless Discovery for Kubernetes
Lecture 62 Container Registry Vulnerability Assessment
Lecture 63 Data Aware Security Posture
Lecture 64 EASM Insights in Network Exposure
Lecture 65 DevOps Security
Section 12: CWP Overview
Lecture 66 What is CWP?
Lecture 67 Alert Queue
Lecture 68 Demo: Alert Queue
Lecture 69 Demo: Create Sample Alerts
Lecture 70 Demo: Create Suppression Rules
Lecture 71 Demo: Setup Email Notifications
Section 13: CWP - Defender for Servers Overview
Lecture 72 What is Defender for Servers?
Lecture 73 Agents
Lecture 74 Plans
Section 14: CWP - Defender for Servers P1
Lecture 75 Defender for Endpoint Integration
Lecture 76 Licensing
Lecture 77 Defender for Endpoint Provisioning
Lecture 78 Threat Detection for OS-Level
Lecture 79 Alerts for Windows Machines
Lecture 80 Alerts for Linux Machines
Lecture 81 Demo: Brute Force SSH
Section 15: CWP - Defender for Servers P2
Lecture 82 Threat Detection for Network Level
Lecture 83 Qualys Vulnerability Assessment
Lecture 84 Adaptive Application Controls
Lecture 85 Demo: Adaptive Application Controls
Lecture 86 Free Data Ingestion to Log Analytics Workspaces
Lecture 87 Free Azure Update Manager Remediation for Arc machines
Lecture 88 Just-in-time VM access
Lecture 89 Demo: Just-in-time VM access
Lecture 90 Adaptive Network Hardening
Lecture 91 File Integrity Monitoring
Lecture 92 Demo: File Integrity Monitoring
Lecture 93 Network Map
Lecture 94 Demo: Network Map
Section 16: CWP - Defender for App Service
Lecture 95 Overview
Section 17: CWP - Defender for Databases
Lecture 96 Overview
Lecture 97 Defender for SQL Databases
Lecture 98 Defender for Open-Source Relational Databases
Lecture 99 Defender for Cosmos DB
Section 18: CWP - Defender for Storage
Lecture 100 Overview
Lecture 101 Demo: Defender for Storage
Section 19: CWP - Defender for Containers
Lecture 102 Overview
Lecture 103 Environment Hardening
Lecture 104 Vulnerability Assessment
Lecture 105 Threat Protection
Lecture 106 Demo: Defender for Containers
Section 20: CWP - Defender for Key Vault
Lecture 107 Overview
Lecture 108 Demo: Defender for Key Vault
Section 21: CWP - Defender for Resource Manager
Lecture 109 Overview
Lecture 110 Demo: Defender for Resource Manager
Section 22: CWP - Defender for APIs
Lecture 111 Overview
Section 23: Automation
Lecture 112 Workflow Automation
Lecture 113 Azure Logic Apps
Lecture 114 Demo: Malware Scanning Response with Workflow Automation & Azure Logic Apps
Section 24: Integration
Lecture 115 Integration with Sentinel
Lecture 116 Integration with other SIEMs
Lecture 117 Integration with Defender for IoT
Lecture 118 Integration with Azure Web Application Firewall
Lecture 119 Integration with Azure DDoS Protection Standard
Section 25: Additional Topics
Lecture 120 Community
Lecture 121 Azure Lighthouse
SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,Cloud Engineer,Cloud Architect,IT Manager