Dekorationsartikel gehören nicht zum Leistungsumfang.
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
Taschenbuch von Trevor Stuart
Sprache: Englisch

51,40 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 4-7 Werktage

Kategorien:
Beschreibung
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender

Key Features:Detect, protect, investigate, and remediate threats using Microsoft Defender for endpoint
Explore multiple tools using the M365 Defender Security Center
Get ready to overcome real-world challenges as you prepare to take the SC-200 exam

Book Description:
Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.
Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.
By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.

What You Will Learn:Discover how to secure information technology systems for your organization
Manage cross-domain investigations in the Microsoft 365 Defender portal
Plan and implement the use of data connectors in Microsoft Defender for Cloud
Get to grips with designing and configuring a Microsoft Sentinel workspace
Configure SOAR (security orchestration, automation, and response) in Microsoft Sentinel
Find out how to use Microsoft Sentinel workbooks to analyze and interpret data
Solve mock tests at the end of the book to test your knowledge

Who this book is for:
This book is for security professionals, cloud security engineers, and security analysts who want to learn and explore Microsoft Security Stack. Anyone looking to take the SC-200 exam will also find this guide useful. A basic understanding of Microsoft technologies and security concepts will be beneficial.
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender

Key Features:Detect, protect, investigate, and remediate threats using Microsoft Defender for endpoint
Explore multiple tools using the M365 Defender Security Center
Get ready to overcome real-world challenges as you prepare to take the SC-200 exam

Book Description:
Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.
Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.
By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.

What You Will Learn:Discover how to secure information technology systems for your organization
Manage cross-domain investigations in the Microsoft 365 Defender portal
Plan and implement the use of data connectors in Microsoft Defender for Cloud
Get to grips with designing and configuring a Microsoft Sentinel workspace
Configure SOAR (security orchestration, automation, and response) in Microsoft Sentinel
Find out how to use Microsoft Sentinel workbooks to analyze and interpret data
Solve mock tests at the end of the book to test your knowledge

Who this book is for:
This book is for security professionals, cloud security engineers, and security analysts who want to learn and explore Microsoft Security Stack. Anyone looking to take the SC-200 exam will also find this guide useful. A basic understanding of Microsoft technologies and security concepts will be beneficial.
Über den Autor
Trevor Stuart has over 15 years of experience in IT. He started with SMS and Active Directory and maintained exposure in the field through various naming changes and technical additions. Trevor has a passion for IT but more so with Cybersecurity. Trevor swiftly moved into Cybersecurity and focused on securing privileged access, hardening operating systems, implementing tiering within AD, tying identities to modern authentication mechanisms, scaling out the identity to the hybrid world, application migration in secure manners in Azure, and leveraging built-in security controls in multiple clouds and platforms to secure workloads. Trevor is a technology enthusiast at heart and the world of Cybersecurity only lights the fire of passion inside of him.
Details
Erscheinungsjahr: 2022
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 288
ISBN-13: 9781803231891
ISBN-10: 1803231890
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Stuart, Trevor
Hersteller: Packt Publishing
Maße: 235 x 191 x 16 mm
Von/Mit: Trevor Stuart
Erscheinungsdatum: 16.03.2022
Gewicht: 0,543 kg
preigu-id: 121354579
Über den Autor
Trevor Stuart has over 15 years of experience in IT. He started with SMS and Active Directory and maintained exposure in the field through various naming changes and technical additions. Trevor has a passion for IT but more so with Cybersecurity. Trevor swiftly moved into Cybersecurity and focused on securing privileged access, hardening operating systems, implementing tiering within AD, tying identities to modern authentication mechanisms, scaling out the identity to the hybrid world, application migration in secure manners in Azure, and leveraging built-in security controls in multiple clouds and platforms to secure workloads. Trevor is a technology enthusiast at heart and the world of Cybersecurity only lights the fire of passion inside of him.
Details
Erscheinungsjahr: 2022
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 288
ISBN-13: 9781803231891
ISBN-10: 1803231890
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Stuart, Trevor
Hersteller: Packt Publishing
Maße: 235 x 191 x 16 mm
Von/Mit: Trevor Stuart
Erscheinungsdatum: 16.03.2022
Gewicht: 0,543 kg
preigu-id: 121354579
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte