Use Microsoft Defender for Cloud to Mitigate Threats

2 H 31 M

Just you? Training a whole team? There's an ITProTV plan that fits.

Start Training Today
  • Introduction
    • Course Overview
    • Introducing Microsoft Defender for Cloud
  • Cloud Security Posture Mgmt
    • Plan and Configure Defender for Cloud
    • Configure Defender for Cloud Roles
    • Assess Cloud Workload Protection
    • Use Microsoft Defender for Cloud Secure Score
    • Setting Security and Regulatory Policy
  • Use Data Connectors for Data Ingestion
    • Configure Automated Onboarding
    • Connect Multi-Cloud and On-Prem Resources
    • Defender for Cloud Data Collection
  • Configure and Respond to Alerts
    • Working with Alerts and Email Notifications
    • Configure Workflow Automation
    • Reporting in Defender and User Data Management

Course Overview

3 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description
  • Transcript

line:-1 <v.Female.spk1 Speaker1>>> Thank you so much for joining us. I'm your host line:-1 <v.Female.spk1 Speaker1>Lauren Deal. And I'll be your learner advocate as we go along line:-1 <v.Female.spk1 Speaker1>asking Anthony all the questions that you may have line:-1 <v.Female.spk1 Speaker1>been home. So Anthony, welcome to the show. Thanks so much. line:-1 <v.Female.spk1 Speaker1>Super excited to be here. I am. line:-1 <v.Male.spk2 Speaker2>>> Just so busy with cloud these days. My background is line:-1 <v.Male.spk2 Speaker2>primarily in Cisco and Juniper with infrastructures. But I'll line:-1 <v.Male.spk2 Speaker2>tell you, over the last decade, it's been cloud cloud and more line:-1 <v.Male.spk2 Speaker2>cloud. We're going to be discussing a very interesting line:-1 <v.Male.spk2 Speaker2>product in the Microsoft portfolio. We're going to be line:-1 <v.Male.spk2 Speaker2>looking at defender for cloud. Now there's defender for cloud line:-1 <v.Male.spk2 Speaker2>apps. There's defender for endpoints. There's defender for line:-1 <v.Male.spk2 Speaker2>Microsoft. 3.65. There's lots of defender products. But this line:-1 <v.Male.spk2 Speaker2>one is quite unique. What we're going to see is a cloud based line:-1 <v.Male.spk2 Speaker2>tool for managing your cloud stuff with an interest in line:-1 <v.Male.spk2 Speaker2>security. As we're going to see, this is going to be line:-1 <v.Male.spk2 Speaker2>multi-cloud ready. So, Lauren, if you've got lots of great line:-1 <v.Male.spk2 Speaker2>resources in Google Cloud platform and AWS and Azure, line:-1 <v.Male.spk2 Speaker2>like many of us do, this is going to be your opportunity to line:-1 <v.Male.spk2 Speaker2>manage security for that multi-cloud environment all in line:-1 <v.Male.spk2 Speaker2>one simple platform. So that's what we're going to be line:-1 <v.Male.spk2 Speaker2>discussing. Everything there is to know where everything we can line:-1 <v.Male.spk2 Speaker2>find to educate you about on defender for cloud in this line:-1 <v.Male.spk2 Speaker2>show. Well, this is a lot of ground to cover. We're really line:-1 <v.Male.spk2 Speaker2>excited to jump in about the details, but maybe someone line:-1 <v.Male.spk2 Speaker2>who's watching at home, what would be the ideal person who line:-1 <v.Male.spk2 Speaker2>would benefit from this course? That's a great question. line:-1 <v.Male.spk2 Speaker2>This is really going to be great for 2 types of are line:-1 <v.Male.spk2 Speaker2>types of individuals. Really. line:-1 <v.Male.spk2 Speaker2>The first type is maybe you're a decision maker for your line:-1 <v.Male.spk2 Speaker2>organization and you want to tour. You want to see what this line:-1 <v.Male.spk2 Speaker2>thing can do. So we'll have individuals watch this show for line:-1 <v.Male.spk2 Speaker2>that reason. What can defender for cloud really bring to their line:-1 <v.Male.spk2 Speaker2>security posture? line:-1 <v.Male.spk2 Speaker2>Maybe you have been tasked with implementing this. So the line:-1 <v.Male.spk2 Speaker2>decision has been made. We are going to use defender for line:-1 <v.Male.spk2 Speaker2>cloud. So now you have to run out there and implement that or line:-1 <v.Male.spk2 Speaker2>maybe you are interested in getting certified. This course line:-1 <v.Male.spk2 Speaker2>we are teaching maps to an exam for Microsoft called SC. line:-1 <v.Male.spk2 Speaker2>That's for Security SE 200. So maybe you are interested in line:-1 <v.Male.spk2 Speaker2>the SE 200 exam or I suppose, Lauren, you have a combination line:-1 <v.Male.spk2 Speaker2>of those 3 things. line:-1 <v.Female.spk1 Speaker1>>> Or you're someone like me who can never be I complete line:-1 <v.Female.spk1 Speaker1>with their lifelong learning. And so this is something that line:-1 <v.Female.spk1 Speaker1>just speaks to me. And I'm just curious. And so I'll be asking line:-1 <v.Female.spk1 Speaker1>Anthony all these questions and high learning along with you at line:-1 <v.Female.spk1 Speaker1>home. So right. All right. line:-1 <v.Male.spk2 Speaker2>>> And Lauren, you particularly qualified to host the show? line:-1 <v.Male.spk2 Speaker2>I she won't Bragg so I do it for her. Morin is certified in line:-1 <v.Male.spk2 Speaker2>AWS. Lauren has taught Splunk with me here. Lauren has taught line:-1 <v.Male.spk2 Speaker2>on the Microsoft Central here with me. So she is in a great line:-1 <v.Male.spk2 Speaker2>position to host this and we're lucky to have her. Thank you so line:-1 <v.Male.spk2 Speaker2>much and the end. line:-1 <v.Female.spk1 Speaker1>>> I'm a learning along with you, but also coming from a line:-1 <v.Female.spk1 Speaker1>place where this is kind of my interests, peso. It's a big line:-1 <v.Female.spk1 Speaker1>jump into our first episode. What do you think? Let's do it. line:-1 <v.Female.spk1 Speaker1>All right. We'll see you there