-
365.000 HUF
-
365.000 HUF
-
365.000 HUF
-
365.000 HUF
Net price/person:
365.000 HUF
Duration
4 Day
-
Mitigate threats using Microsoft Defender XDR
-
Introduction to threat protection with Microsoft Defender XDR
-
Mitigate incidents using Microsoft Defender XDR
-
Remediate risks with Defender for Office 365 in Microsoft Defender XDR
-
Microsoft Defender for Identity in Microsoft Defender XDR
-
Protect your identities with Entra ID Protection
-
Defender for Cloud Apps in Microsoft Defender XDR
-
-
Mitigate threats using Microsoft Purview
-
• Microsoft Purview Compliance Solutions
-
• Investigate and remediate compromised entities identified by Microsoft Purview data loss prevention (DLP) policies
-
• Investigate and remediate insider risk threats identified by Microsoft Purview policies
-
• Investigate threats using Content search in Microsoft Purview
-
• Investigate threats using Microsoft Purview Audit (Standard)
-
• Investigate threats using Microsoft Purview Audit (Premium)
-
-
Mitigate threats using Microsoft Defender for Endpoint
-
Protect against threats with Microsoft Defender for Endpoint
-
Deploy the Microsoft Defender for Endpoint environment
-
Implement Windows security enhancements
-
Perform device investigations
-
Perform actions on a device
-
Perform evidence and entities investigations
-
Configure and manage automation
-
Configure for alerts and detections
-
Utilize Threat and Vulnerability Management
-
-
Mitigate threats using Microsoft Defender for Cloud
-
Plan for cloud workload protections using Microsoft Defender for Cloud
-
Connect Azure assets to Microsoft Defender for Cloud
-
Connect non-Azure assets to Microsoft Defender for Cloud
-
Manage your cloud security posture management
-
Workload protections in Microsoft Defender for Cloud
-
Remediate security alerts using Microsoft Defender for Cloud
-
-
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
-
Construct KQL statements for Microsoft Sentinel
-
Analyze query results using KQL
-
Build multi-table statements using KQL
-
Work with string data using KQL statements
-
-
Configure your Microsoft Sentinel environment
-
Introduction to Microsoft Sentinel
-
Create and manage Microsoft Sentinel workspaces
-
Query logs in Microsoft Sentinel
-
Use watchlists in Microsoft Sentinel
-
Utilize threat intelligence in Microsoft Sentinel
-
-
Connect logs to Microsoft Sentinel
-
Manage content in Microsoft Sentinel
-
Connect data to Microsoft Sentinel using data connectors
-
Connect Microsoft services to Microsoft Sentinel
-
Connect Microsoft Defender XDR to Microsoft Sentinel
-
Connect Windows hosts to Microsoft Sentinel
-
Connect Common Event Format logs to Microsoft Sentinel
-
Connect syslog data sources to Microsoft Sentinel
-
Connect threat indicators to Microsoft Sentinel
-
-
Create detections and perform investigations using Microsoft Sentinel
-
Threat detection with Microsoft Sentinel analytics
-
Automation in Microsoft Sentinel
-
Threat response with Microsoft Sentinel playbooks
-
Security incident management in Microsoft Sentinel
-
Entity behavioral analytics in Microsoft Sentinel
-
Data normalization in Microsoft Sentinel
-
Query, visualize, and monitor data in Microsoft Sentinel
-
-
Perform threat hunting in Microsoft Sentinel
-
Explain threat hunting concepts in Microsoft Sentinel
-
Threat hunting with Microsoft Sentinel
-
Use Search jobs in Microsoft Sentinel
-
Optional - Hunt for threats using notebooks in Microsoft Sentinel
-