Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Securing AI (with Microsoft Cloud)

Rekomendowane odpowiedzi

284f7c68a496760adfcc1fca1ed61e4e.jpeg
Free Download Udemy - Securing AI (with Microsoft Cloud)
Published 9/2024
Created by Kuljot Singh Bakshi
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 39 Lectures ( 8h 5m ) | Size: 3.3 GB

MS Purview, Identity And Access Management, Microsoft Entra ID, ChatGPT, Microsoft Copilot, Google Gemini
What you'll learn:
Securing Generative AI like Microsoft Copilot, ChatGPT
Securing Predictive AI
Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender
Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc.
Learn about Cloud Security Posture Management and Cloud Security Hygiene
Requirements:
Intermediate experience with Microsoft Azure required
Intermediate experience with Microsoft Cloud , Office 365 etc. required
Description:
With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour. In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.The following Microsoft security solutions will be covered in this course:1) Microsoft Entra ID - Cloud-based identity and access management service for secure resource access.2)Microsoft Entra Conditional Access - Centralized policy control for authentication conditions and data/application security.3)Microsoft Defender for Identity - Detects on-premises identity attacks using behavioral analysis and specific threat detections.4)Intune - Cloud-based mobile device and application management service, integrates with Conditional Access for device security.5)Defender for Endpoint - Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.6)Defender for Cloud Apps - Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.7) Defender for Office 365 - Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.8) Defender for Cloud - Simplifies detection, automated investigation, and response for Azure resources.9) Microsoft Purview DLP - Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.10) Microsoft Purview Information Protection - Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.11) Intune Mobile App Management (MAM) - Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.12) Defender for Cloud Apps - Provides security capabilities for cloud applications.13) Microsoft Defender XDR provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.14) Microsoft Sentinel is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time.
Who this course is for:
Anyone looking to securely deploy AI into their organization
Security Analysts
AI Developers
SOC engineers
DevSecOps Engineers
Homepage

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.








Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 14 Views
    • 1 Posts
    • 12 Views
    • 1 Posts
    • 15 Views
    • 1 Posts
    • 13 Views
    • 1 Posts
    • 20 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.