Use Microsoft Defender for Cloud to Mitigate Threats

Overview

This course seeks to educate students on Microsoft Defender for Cloud. This new Microsoft application is a cloud-native application protection platform that seeks to assist with security in multi-cloud environments. This product is unique from Microsoft in many ways, one of them being the fact that the platform fulfills many roles within the context of cloud security. Defender for Cloud functions as the following product categories: - CNAPP (Cloud Native Application Protection Platform) - CSPM (Cloud Security Posture Management) - CWPP (Cloud Workload Protection Platform) This course focuses on the use of Microsoft Defender for Cloud to help protect cloud applications and the data they contain.
Use Microsoft Defender for Cloud to Mitigate Threats Overview
Clock icon0h 3m
WEBVTT Thank you so much for joining us. I'm your host, Lauren Deal. And I'll be your learner advocate as we go along, asking Anthony all the questions that you may have at home. So Anthony, welcome to the show. Thanks so much. Super excited to be here. I am just so busy with cloud these days. My background is primarily in Cisco and Juniper with infrastructures. But I'll tell you, over the last decade, it's been cloud, cloud, and more cloud. We're going to be discussing a very interesting product in the Microsoft portfolio. We're going to be looking at Defender for Cloud. Now, there's Defender for Cloud apps. There's Defender for endpoints. There's Defender for Microsoft 365. There's lots of Defender products. But this one's quite unique. What we're going to see is a cloud-based tool for managing your cloud stuff with an interest in security. As we're going to see, this is going to be multi-cloud ready. So Lauren, if you've got lots of great resources in Google Cloud Platform and AWS and Azure, like many of us do, this is going to be your opportunity to manage security for that multi-cloud environment all in one simple platform. So that's what we're going to be discussing. Everything there is to know or everything we can find to educate you about on Defender for Cloud in this show. Well, this is a lot of ground to cover. We're really excited to jump in about the details. But maybe someone who's watching at home, what would be the ideal person who would benefit from this course? That's a great question. This is really going to be great for two types of-- three types of individuals, really. The first type is maybe you're a decision maker for your organization, and you want to tour. You want to see what this thing can do. So we'll have individuals watch this show for that reason. What can Defender for Cloud really bring to their security posture? Maybe you have been tasked with implementing this, so the decision has been made. We are going to use Defender for Cloud, so now you have to run out there and implement that. Or maybe you are interested in getting certified. This course we are teaching maps to an exam from Microsoft called SC-- that's for security-- SC200. So maybe you are interested in the SC200 exam. Or I suppose, Lauren, you have a combination of those three things. Or you're someone like me who can never be complete with their lifelong learning, and so this is something that just speaks to me, and I'm just curious. And so I'll be asking Anthony all these questions and learning along with you at home. That's right. And Lauren, you're particularly qualified to host this show. She won't brag, so I have to do it for her. Lauren is certified in AWS. Lauren has taught Splunk with me here. Lauren has taught the Microsoft Sentinel here with me. So she is in a great position to host this, and we're lucky to have her. Thank you so much, Anthony. And I'm learning along with you, but also coming from a place where this is kind of my intro space. So excited to jump into our first episode. What do you say? Let's do it. All right, we'll see you there.

Learning Style

On Demand

Length of course

2h 31m
13 Episodes

Here are the topics we'll cover

  • Introduction
  • Cloud Security Posture Mgmt
  • Use Data Connectors for Data Ingestion
  • Configure and Respond to Alerts
Learning Options

Options for this course

Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Channel partners
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Individual learners
Learn at your own pace and get your certification training.