Microsoft 365 Security Administration [CoursesGhar]

磁链地址复制复制磁链成功
磁链详情
文件数目:58个文件
文件大小:205.19 MB
收录时间:2022-12-23
访问次数:2
相关内容:MicrosoftSecurityAdministrationCoursesGhar
文件meta
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[1] Plan and implement Azure Sentinel.mp4
    13.88 MB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[1] Configure Microsoft Defender for Office 365.mp4
    12.98 MB
  • [4] 3. Implement and Manage Device and Application Protection/[3] Configure and manage Microsoft Defender Application Control.mp4
    12.34 MB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[2] Monitor Microsoft Defender for Office 365.mp4
    12.3 MB
  • [4] 3. Implement and Manage Device and Application Protection/[8] Plan for securing application data on devices.mp4
    12.08 MB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[3] Conduct simulated attacks using Attack Simulator.mp4
    10.75 MB
  • [1] Introduction/[1] Threat protection.mp4
    10.32 MB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[3] Manage and monitor Azure Sentinel.mp4
    10.13 MB
  • [4] 3. Implement and Manage Device and Application Protection/[2] Configure and manage Microsoft Defender Application Guard.mp4
    9.56 MB
  • [4] 3. Implement and Manage Device and Application Protection/[1] Plan for device and application protection.mp4
    9.29 MB
  • [4] 3. Implement and Manage Device and Application Protection/[6] Configure and manage Windows device encryption.mp4
    9.03 MB
  • [3] 2. Implement Device Threat Protection/[3] Manage and monitor Microsoft Defender for Endpoint.mp4
    8.6 MB
  • [4] 3. Implement and Manage Device and Application Protection/[4] Configure and manage exploit protection.mp4
    8.2 MB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[2] Configure playbooks in Azure Sentinel.mp4
    8.17 MB
  • [4] 3. Implement and Manage Device and Application Protection/[7] Configure and manage non-Windows device encryption.mp4
    7.71 MB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[1] Plan a Microsoft Defender for Identity solution.mp4
    7.5 MB
  • [4] 3. Implement and Manage Device and Application Protection/[5] Configure Secure Boot.mp4
    7.21 MB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[4] Respond to threats in Azure Sentinel.mp4
    6.46 MB
  • [3] 2. Implement Device Threat Protection/[2] Implement Microsoft Defender for Endpoint.mp4
    5.62 MB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[2] Install and configure Microsoft Defender for Identity.mp4
    5.57 MB
  • [4] 3. Implement and Manage Device and Application Protection/[9] Implement application protection policies.mp4
    5.27 MB
  • [3] 2. Implement Device Threat Protection/[1] Plan a Microsoft Defender for Endpoint solution.mp4
    4.32 MB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[3] Monitor and manage Microsoft Defender for Identity.mp4
    3.16 MB
  • [7] Conclusion/[1] Next steps.mp4
    2.97 MB
  • [1] Introduction/[3] Lab setup.mp4
    858.5 KB
  • [1] Introduction/[2] What you should know.mp4
    827.33 KB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[2] Monitor Microsoft Defender for Office 365.srt
    8.48 KB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[1] Configure Microsoft Defender for Office 365.srt
    8.3 KB
  • [4] 3. Implement and Manage Device and Application Protection/[3] Configure and manage Microsoft Defender Application Control.srt
    8.19 KB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[1] Plan and implement Azure Sentinel.srt
    7.93 KB
  • [5] 4. Implement and Manage Microsoft Defender for Office 365/[3] Conduct simulated attacks using Attack Simulator.srt
    7.38 KB
  • [4] 3. Implement and Manage Device and Application Protection/[8] Plan for securing application data on devices.srt
    7.31 KB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[3] Manage and monitor Azure Sentinel.srt
    6.88 KB
  • [4] 3. Implement and Manage Device and Application Protection/[6] Configure and manage Windows device encryption.srt
    6.56 KB
  • [4] 3. Implement and Manage Device and Application Protection/[1] Plan for device and application protection.srt
    6.49 KB
  • [4] 3. Implement and Manage Device and Application Protection/[2] Configure and manage Microsoft Defender Application Guard.srt
    5.85 KB
  • [4] 3. Implement and Manage Device and Application Protection/[4] Configure and manage exploit protection.srt
    5.66 KB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[1] Plan a Microsoft Defender for Identity solution.srt
    5.19 KB
  • [4] 3. Implement and Manage Device and Application Protection/[7] Configure and manage non-Windows device encryption.srt
    5.16 KB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[2] Configure playbooks in Azure Sentinel.srt
    5.15 KB
  • [4] 3. Implement and Manage Device and Application Protection/[5] Configure Secure Boot.srt
    4.84 KB
  • [3] 2. Implement Device Threat Protection/[3] Manage and monitor Microsoft Defender for Endpoint.srt
    4.35 KB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[2] Install and configure Microsoft Defender for Identity.srt
    4.13 KB
  • [4] 3. Implement and Manage Device and Application Protection/[9] Implement application protection policies.srt
    3.98 KB
  • [6] 5. Monitor Microsoft 365 Security with Azure Sentinel/[4] Respond to threats in Azure Sentinel.srt
    3.81 KB
  • [3] 2. Implement Device Threat Protection/[1] Plan a Microsoft Defender for Endpoint solution.srt
    3.67 KB
  • [3] 2. Implement Device Threat Protection/[2] Implement Microsoft Defender for Endpoint.srt
    3.39 KB
  • [7] Conclusion/[1] Next steps.srt
    2.34 KB
  • [2] 1. Implement an Enterprise Hybrid Threat Protection Solution/[3] Monitor and manage Microsoft Defender for Identity.srt
    2.23 KB
  • [1] Introduction/[1] Threat protection.srt
    1.58 KB
©2018 ciligou.app 磁力狗 v2.0
使用必读|联系我们|资源导航|种子提交