Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Securing AI (with Microsoft Cloud)

Posted By: lucky_aut
Securing AI (with Microsoft Cloud)

Securing AI (with Microsoft Cloud)
Published 9/2024
Duration: 8h5m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.29 GB
Genre: eLearning | Language: English

MS Purview, Identity And Access Management, Microsoft Entra ID, ChatGPT, Microsoft Copilot, Google Gemini


What you'll learn
Securing Generative AI like Microsoft Copilot, ChatGPT
Securing Predictive AI
Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender
Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc.
Learn about Cloud Security Posture Management and Cloud Security Hygiene

Requirements
Intermediate experience with Microsoft Azure required
Intermediate experience with Microsoft Cloud , Office 365 etc. required

Description
With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour.
In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.
The following Microsoft security solutions will be covered in this course:
1)
Microsoft Entra ID
- Cloud-based identity and access management service for secure resource access.
2)
Microsoft Entra Conditional Access
- Centralized policy control for authentication conditions and data/application security.
3)
Microsoft Defender for Identity
- Detects on-premises identity attacks using behavioral analysis and specific threat detections.
4)
Intune
- Cloud-based mobile device and application management service, integrates with Conditional Access for device security.
5)
Defender for Endpoint
- Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.
6)
Defender for Cloud Apps
- Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.
7)
Defender for Office 365
- Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.
8)
Defender for Cloud
- Simplifies detection, automated investigation, and response for Azure resources.
9)
Microsoft Purview DLP
- Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.
10)
Microsoft Purview Information Protection
- Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.
11)
Intune Mobile App Management (MAM)
- Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.
12)
Defender for Cloud Apps
- Provides security capabilities for cloud applications.
13)
Microsoft Defender XDR
provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.
14)
Microsoft Sentinel
is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.
Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time.
Who this course is for:
Anyone looking to securely deploy AI into their organization
Security Analysts
AI Developers
SOC engineers
DevSecOps Engineers

More Info