Joe Anich – författare
Visar alla böcker från författaren Joe Anich. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
Häftad, Engelska, 2022
570 kr
Skickas inom 5-8 vardagar
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExplore multiple tools using the M365 Defender Security CenterGet ready to overcome real-world challenges as you prepare to take the SC-200 examBook DescriptionSecurity in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.What you will learnDiscover how to secure information technology systems for your organizationManage cross-domain investigations in the Microsoft 365 Defender portalPlan and implement the use of data connectors in Microsoft Defender for CloudGet to grips with designing and configuring a Microsoft Sentinel workspaceConfigure SOAR (security orchestration, automation, and response) in Microsoft SentinelFind out how to use Microsoft Sentinel workbooks to analyze and interpret dataSolve mock tests at the end of the book to test your knowledgeWho this book is forThis book is for security professionals, cloud security engineers, and security analysts who want to learn and explore Microsoft Security Stack. Anyone looking to take the SC-200 exam will also find this guide useful. A basic understanding of Microsoft technologies and security concepts will be beneficial.
Microsoft Defender for Endpoint in Depth
Take any organization's endpoint security to the next level
Häftad, Engelska, 2023
634 kr
Skickas inom 5-8 vardagar
Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation strategies with this expert-led practitioner's guide.Key FeaturesUnderstand the history of MDE, its capabilities, and how you can keep your organization secureLearn to implement, operationalize, and troubleshoot MDE from both IT and SecOps perspectivesLeverage useful commands, tips, tricks, and real-world insights shared by industry expertsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWith all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you’ll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you’ll be taken through a day in the life of a security analyst working with the product. You’ll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.By the end of the book, you’ll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.What you will learnUnderstand the backstory of Microsoft Defender for EndpointDiscover different features, their applicability, and caveatsPrepare and plan a rollout within an organizationExplore tools and methods to successfully operationalize the productImplement continuous operations and improvement to your security postureGet to grips with the day-to-day of SecOps teams operating the productDeal with common issues using various techniques and toolsUncover commonly used commands, tips, and tricksWho this book is forThis book is for cybersecurity professionals and incident responders looking to increase their knowledge of MDE and its underlying components while learning to prepare, deploy, and operationalize the product. A basic understanding of general systems management, administration, endpoint security, security baselines, and basic networking is required.
Microsoft Defender for Endpoint in Depth
Take any organization's endpoint security to the next level
Häftad, Engelska, 2026
729 kr
Skickas inom 3-6 vardagar
Gain an up-to-date, practical understanding of Microsoft Defender for Endpoint and learn how to run it reliably in real environments with this expert-led practitioner's guide. Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and compare Defender endpoint security capabilities on all supported operating systemsLearn how to deal with complex deployment and configuration scenariosFind new ways of tuning the product to your specific environmentSet yourself up for success by preparing for incidents with recommendations from seasoned professionalsBook DescriptionModern organizations run on constantly changing endpoints, yet many teams still struggle to get the most out of Defender endpoint security. Coverage gaps, noisy detections, mixed platforms, and unclear device behavior often get in the way of effective prevention, detection, and response.This second edition helps you tackle those challenges directly. Updated for today’s Defender endpoint security, and the broader Microsoft Defender ecosystem, it shows how MDE works across clients, servers, and now mobile devices, and how to align deployments with real-world constraints. New chapters on mobile threat defense, production rollout, and tuning provide practical guidance for moving beyond pilot environments, handling edge cases, and protecting critical and legacy assets. Throughout, the book brings together IT and SecOps viewpoints to help you operate Defender for Endpoint with more clarity and less friction. You’ll learn how to maintain sensor health, interpret incidents confidently, reduce noise without weakening protection, and troubleshoot recurring issues. Whether you’re refining an existing deployment or planning a new one, this edition gives you a clearer path to making Defender for Endpoint a reliable part of your security program.What you will learnExplore the current Defender for Endpoint architecture and capabilitiesClarify how next-gen protection, ASR, and EDR work togetherPrepare a deployment plan that fits your estate, risk, and existing toolsRoll out Defender for Endpoint to production in staged, testable phasesProtect mobile devices using Defender for Endpoint and MTDTune alerts, exclusions, and policies for different scenarios and assetsSupport SecOps investigations using incidents, hunting, and device dataDiagnose common health, connectivity, and performance issues in live estatesWho this book is forThis book is for cybersecurity professionals, security engineers, incident responders, endpoint administrators, and IT pros who are responsible for planning, deploying, or operating Microsoft Defender for Endpoint. It assumes a basic understanding of systems management, endpoint security, security baselines, and networking. Returning readers get updated, real-world guidance plus new coverage of mobile devices, production rollouts, and tuning. New readers get a structured introduction from core concepts to deployment, operations, and troubleshooting.