SC-200 Microsoft Security Operations Analyst:
In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781836201632/?ar |
Zusammenfassung: | In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical lessons, you'll gain hands-on experience with security baselines, extended detection, and response mechanisms, and the action center for efficient threat mitigation. The course then transitions to Microsoft Defender for Cloud, guiding you through planning and configuring cloud security measures. You will learn to assess cloud workload protection, configure workflow automation, and integrate multi-cloud and on-prem resources. Emphasis is placed on understanding the Microsoft Secure Score and implementing robust security and regulatory policies to maintain compliance. Finally, you will delve into Microsoft Sentinel, where you will configure resources, roles, and data connectors. The course covers advanced topics such as incident creation logic, automation rules, threat hunting, and developing custom logs in Azure Log Analytics. By the end of this course, you will be proficient in using Microsoft's powerful security tools to protect your organization's digital assets. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) |
Umfang: | 1 Online-Ressource (1 video file (8 hr., 36 min.)) sound, color. |
ISBN: | 9781836201632 183620163X |
Internformat
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104371064 | ||
003 | DE-627-1 | ||
005 | 20240701091202.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx ||| |o o ||eng c | ||
020 | |a 9781836201632 |c electronic video |9 978-1-83620-163-2 | ||
020 | |a 183620163X |c electronic video |9 1-83620-163-X | ||
035 | |a (DE-627-1)104371064 | ||
035 | |a (DE-599)KEP104371064 | ||
035 | |a (ORHE)9781836201632 | ||
035 | |a (DE-627-1)104371064 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8076 |2 23/eng/20240603 | |
245 | 0 | 0 | |a SC-200 Microsoft Security Operations Analyst |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (8 hr., 36 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) | ||
520 | |a In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical lessons, you'll gain hands-on experience with security baselines, extended detection, and response mechanisms, and the action center for efficient threat mitigation. The course then transitions to Microsoft Defender for Cloud, guiding you through planning and configuring cloud security measures. You will learn to assess cloud workload protection, configure workflow automation, and integrate multi-cloud and on-prem resources. Emphasis is placed on understanding the Microsoft Secure Score and implementing robust security and regulatory policies to maintain compliance. Finally, you will delve into Microsoft Sentinel, where you will configure resources, roles, and data connectors. The course covers advanced topics such as incident creation logic, automation rules, threat hunting, and developing custom logs in Azure Log Analytics. By the end of this course, you will be proficient in using Microsoft's powerful security tools to protect your organization's digital assets. | ||
650 | 0 | |a Computer security |v Study guides |x Examinations | |
650 | 0 | |a Electronic data processing personnel |v Study guides |x Certification | |
650 | 4 | |a Sécurité informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Sequeira, Anthony |e MitwirkendeR |4 ctb | |
700 | 1 | |a Deal, Lauren |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781836201632/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104371064 |
---|---|
_version_ | 1831287144834924545 |
adam_text | |
any_adam_object | |
author2 | Sequeira, Anthony Deal, Lauren |
author2_role | ctb ctb |
author2_variant | a s as l d ld |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Sequeira, Anthony Deal, Lauren ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104371064 (DE-599)KEP104371064 (ORHE)9781836201632 |
dewey-full | 005.8076 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8076 |
dewey-search | 005.8076 |
dewey-sort | 15.8076 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03207ngm a22005172c 4500</leader><controlfield tag="001">ZDB-30-ORH-104371064</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091202.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781836201632</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83620-163-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">183620163X</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83620-163-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104371064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781836201632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104371064</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8076</subfield><subfield code="2">23/eng/20240603</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">SC-200 Microsoft Security Operations Analyst</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (8 hr., 36 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed June 3, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical lessons, you'll gain hands-on experience with security baselines, extended detection, and response mechanisms, and the action center for efficient threat mitigation. The course then transitions to Microsoft Defender for Cloud, guiding you through planning and configuring cloud security measures. You will learn to assess cloud workload protection, configure workflow automation, and integrate multi-cloud and on-prem resources. Emphasis is placed on understanding the Microsoft Secure Score and implementing robust security and regulatory policies to maintain compliance. Finally, you will delve into Microsoft Sentinel, where you will configure resources, roles, and data connectors. The course covers advanced topics such as incident creation logic, automation rules, threat hunting, and developing custom logs in Azure Log Analytics. By the end of this course, you will be proficient in using Microsoft's powerful security tools to protect your organization's digital assets.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="v">Study guides</subfield><subfield code="x">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sequeira, Anthony</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deal, Lauren</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781836201632/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104371064 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:15Z |
institution | BVB |
isbn | 9781836201632 183620163X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (8 hr., 36 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | SC-200 Microsoft Security Operations Analyst [First edition]. [Birmingham, United Kingdom] Packt Publishing [2024] 1 Online-Ressource (1 video file (8 hr., 36 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) In this comprehensive course, you will embark on a journey to master the various components of Microsoft Security Operations. Starting with Microsoft 365 Defender, you will learn to protect your organization from threats targeting Office 365, cloud apps, and endpoints. Through a series of practical lessons, you'll gain hands-on experience with security baselines, extended detection, and response mechanisms, and the action center for efficient threat mitigation. The course then transitions to Microsoft Defender for Cloud, guiding you through planning and configuring cloud security measures. You will learn to assess cloud workload protection, configure workflow automation, and integrate multi-cloud and on-prem resources. Emphasis is placed on understanding the Microsoft Secure Score and implementing robust security and regulatory policies to maintain compliance. Finally, you will delve into Microsoft Sentinel, where you will configure resources, roles, and data connectors. The course covers advanced topics such as incident creation logic, automation rules, threat hunting, and developing custom logs in Azure Log Analytics. By the end of this course, you will be proficient in using Microsoft's powerful security tools to protect your organization's digital assets. Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Sequeira, Anthony MitwirkendeR ctb Deal, Lauren MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | SC-200 Microsoft Security Operations Analyst Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | SC-200 Microsoft Security Operations Analyst |
title_auth | SC-200 Microsoft Security Operations Analyst |
title_exact_search | SC-200 Microsoft Security Operations Analyst |
title_full | SC-200 Microsoft Security Operations Analyst |
title_fullStr | SC-200 Microsoft Security Operations Analyst |
title_full_unstemmed | SC-200 Microsoft Security Operations Analyst |
title_short | SC-200 Microsoft Security Operations Analyst |
title_sort | sc 200 microsoft security operations analyst |
topic | Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT sequeiraanthony sc200microsoftsecurityoperationsanalyst AT deallauren sc200microsoftsecurityoperationsanalyst AT acilearningfirm sc200microsoftsecurityoperationsanalyst AT packtpublishing sc200microsoftsecurityoperationsanalyst |