
Hands-On With Openai Reasoning Models
Released 06/2025
With Ronnie Sheer
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 1h 6m 7s | Size: 151 MB
Read More

5g Security In Depth: A Hands-On Approach To Securing Ran, Core, And Telco Cloud
Released: 06/2025
Duration: 1h 48m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 261 MB
Level: Intermediate | Genre: eLearning | Language: English
Read More

Ernesti J Python 3 The Comprehensive Guide to Hands-On Python Programming 2023 | 15.26 MB
Title: Python 3: The Comprehensive Guide
Author: Johannes Ernesti
Read More

Cisco Packet Tracer - Downloadable Hands On Labs
Published 6/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 3h 59m | Size: 1.8 GB
Master Networking Fundamentals with Downloadable Cisco Labs – Switching, Routing, Services & More
Read More
[center]

Microsoft Defender For Endpoint Course With Hands On Sims
Published 6/2025
Created by John Christopher
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 69 Lectures ( 7h 43m ) | Size: 4 GB
/center]
Learn how to expertly administer Microsoft Defender for Endpoint with hands on experience!
What you'll learn
Learn the concepts and perform hands on activities needed to master Microsoft Defender for Endpoint
Gain a tremendous amount of knowledge involving Microsoft Defender for Endpoint
Learn using hands on simulations on how Microsoft Defender for Endpoint is administered!
Learn how to set up your own test lab for practicing the concepts!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the course!Understanding the Microsoft 365 and Azure EnvironmentA Solid Foundation of Active Directory DomainsA Solid Foundation of RAS, DMZ, and VirtualizationA Solid Foundation of the Microsoft Cloud ServicesIMPORTANT Using Assignments in the courseQuestions for John ChristopherCertificate of CompletionSetting up for hands onDONT SKIP: Before beginning your account setupCreating a trial Microsoft 365/Azure AccountUsing a Hyper-V virtual machine or an Azure virtual machineSetting up an Azure virtual machine for hands onHYPER-V: Getting Hyper-V Installed on WindowsHYPER-V: Creating a Virtual Switch in Hyper-VHYPER-V: Downloading the Windows 11 ISOHYPER-V: Installing a Windows 11 virtual machineDevice management support with Microsoft EntraOverview of device management of Microsoft device managements conceptsRegistering devices vs joining devices with Microsoft EntraConfiguring Microsoft Entra for device managementJoining our virtual machine to Microsoft EntraIntroduction to Endpoint Security & Microsoft Defender for EndpointWhat is Endpoint Security?High level overview of Microsoft Defender for EndpointLicensing and Plan Comparison (P1 vs P2)Microsoft 365 Defender Portal TourHow Defender for Endpoint relates to Microsoft IntuneIntroduction to Microsoft Intune for device managementSetting Up Defender for EndpointPrerequisites and Supported Operating SystemsCreating a Microsoft Defender Admin role for permissionsOnboarding a Windows device to Defender for EndpointMass automatic onboarding with Microsoft IntuneVerifying Windows devices have been onboardedImplementing device discoveryDefender for Endpoint Vulnerability ManagementWhat are Common Vulnerabilities and Exposures (CVEs)?Inspecting vulnerabilities on a specific deviceUsing the vulnerability management dashboard for high level overviewImproving security with the help of vulnerability recommendationsUtilizing remediation within vulnerability managementCreating and managing Device Groups for Defender for EndpointConfiguration and Policy ManagementHardening endpoint security by using Endpoint Security PoliciesAttack Surface Reduction (ASR) RulesWhat is Next-Gen Protection with Microsoft Defender for Endpoint?Understanding the local anti-virus settings on Windows 11Implementing Next-Gen Protection for devicesUnderstanding the local Defender Firewall settings on Windows 11Implementing Firewall Rule Policies using Defender for EndpointUsing Security Baselines in securing our devicesUtilizing Microsoft Purview Endpoint DLP (Data Loss Prevention)Understanding the concepts of DLP (Data Loss Prevention)Considering device requirements before using Endpoint DLPSettings for configuring Endpoint DLPConfiguring DLP policies with advanced rulesEnabling just-in-time (JIT) protectionHow to monitor for endpoint activitiesIncident Response and InvestigationWhat is Automated Investigation and Remediation (AIR)?Implementing Automated Investigation and Remediation (AIR) within device groupsTriggering incidents using a client device for testingInvestigating incidents generated by Defender managed devicesViewing alerts generated by Defender managed devicesManaging and classifying detected alertsKusto Query Language (KQL)What is Kusto Query Language (KQL)?Using the Microsoft KQL Demo environment, downloading resource materials and AIBasic KQL syntax for searching for informationSummarizing KQL results and filtering based on time rangesControlling KQL data displayed based on columns, amounts and charactersUsing KQL variables and combining output dataRunning Threat Hunting Queries with Advanced Hunting (KQL)Utilizing Microsoft's Sentinel and Defender repository of premade KQL Queries
Who this course is for
IT people interested in learning a tremendous amount about Microsoft Defender for Endpoint
https://rapidgator.net/file/d08ef28dfe0fa59de9cb2820f06feba1/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part5.rar.html
https://rapidgator.net/file/5cf909b3e849644237702ce4abbf6fc4/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part4.rar.html
https://rapidgator.net/file/cd4f8d1f21a70b82a55e7bf81703fbc8/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part3.rar.html
https://rapidgator.net/file/9d7b3fad683d8d05de2a68cb219d1694/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part2.rar.html
https://rapidgator.net/file/7e23fe821a0c61049505a6b06dce3e7b/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part1.rar.html

Microsoft Defender For Endpoint Course With Hands On Sims
Published 6/2025
Created by John Christopher
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 69 Lectures ( 7h 43m ) | Size: 4 GB
/center]
Learn how to expertly administer Microsoft Defender for Endpoint with hands on experience!
What you'll learn
Learn the concepts and perform hands on activities needed to master Microsoft Defender for Endpoint
Gain a tremendous amount of knowledge involving Microsoft Defender for Endpoint
Learn using hands on simulations on how Microsoft Defender for Endpoint is administered!
Learn how to set up your own test lab for practicing the concepts!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more than the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the course!Understanding the Microsoft 365 and Azure EnvironmentA Solid Foundation of Active Directory DomainsA Solid Foundation of RAS, DMZ, and VirtualizationA Solid Foundation of the Microsoft Cloud ServicesIMPORTANT Using Assignments in the courseQuestions for John ChristopherCertificate of CompletionSetting up for hands onDONT SKIP: Before beginning your account setupCreating a trial Microsoft 365/Azure AccountUsing a Hyper-V virtual machine or an Azure virtual machineSetting up an Azure virtual machine for hands onHYPER-V: Getting Hyper-V Installed on WindowsHYPER-V: Creating a Virtual Switch in Hyper-VHYPER-V: Downloading the Windows 11 ISOHYPER-V: Installing a Windows 11 virtual machineDevice management support with Microsoft EntraOverview of device management of Microsoft device managements conceptsRegistering devices vs joining devices with Microsoft EntraConfiguring Microsoft Entra for device managementJoining our virtual machine to Microsoft EntraIntroduction to Endpoint Security & Microsoft Defender for EndpointWhat is Endpoint Security?High level overview of Microsoft Defender for EndpointLicensing and Plan Comparison (P1 vs P2)Microsoft 365 Defender Portal TourHow Defender for Endpoint relates to Microsoft IntuneIntroduction to Microsoft Intune for device managementSetting Up Defender for EndpointPrerequisites and Supported Operating SystemsCreating a Microsoft Defender Admin role for permissionsOnboarding a Windows device to Defender for EndpointMass automatic onboarding with Microsoft IntuneVerifying Windows devices have been onboardedImplementing device discoveryDefender for Endpoint Vulnerability ManagementWhat are Common Vulnerabilities and Exposures (CVEs)?Inspecting vulnerabilities on a specific deviceUsing the vulnerability management dashboard for high level overviewImproving security with the help of vulnerability recommendationsUtilizing remediation within vulnerability managementCreating and managing Device Groups for Defender for EndpointConfiguration and Policy ManagementHardening endpoint security by using Endpoint Security PoliciesAttack Surface Reduction (ASR) RulesWhat is Next-Gen Protection with Microsoft Defender for Endpoint?Understanding the local anti-virus settings on Windows 11Implementing Next-Gen Protection for devicesUnderstanding the local Defender Firewall settings on Windows 11Implementing Firewall Rule Policies using Defender for EndpointUsing Security Baselines in securing our devicesUtilizing Microsoft Purview Endpoint DLP (Data Loss Prevention)Understanding the concepts of DLP (Data Loss Prevention)Considering device requirements before using Endpoint DLPSettings for configuring Endpoint DLPConfiguring DLP policies with advanced rulesEnabling just-in-time (JIT) protectionHow to monitor for endpoint activitiesIncident Response and InvestigationWhat is Automated Investigation and Remediation (AIR)?Implementing Automated Investigation and Remediation (AIR) within device groupsTriggering incidents using a client device for testingInvestigating incidents generated by Defender managed devicesViewing alerts generated by Defender managed devicesManaging and classifying detected alertsKusto Query Language (KQL)What is Kusto Query Language (KQL)?Using the Microsoft KQL Demo environment, downloading resource materials and AIBasic KQL syntax for searching for informationSummarizing KQL results and filtering based on time rangesControlling KQL data displayed based on columns, amounts and charactersUsing KQL variables and combining output dataRunning Threat Hunting Queries with Advanced Hunting (KQL)Utilizing Microsoft's Sentinel and Defender repository of premade KQL Queries
Who this course is for
IT people interested in learning a tremendous amount about Microsoft Defender for Endpoint
https://rapidgator.net/file/d08ef28dfe0fa59de9cb2820f06feba1/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part5.rar.html
https://rapidgator.net/file/5cf909b3e849644237702ce4abbf6fc4/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part4.rar.html
https://rapidgator.net/file/cd4f8d1f21a70b82a55e7bf81703fbc8/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part3.rar.html
https://rapidgator.net/file/9d7b3fad683d8d05de2a68cb219d1694/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part2.rar.html
https://rapidgator.net/file/7e23fe821a0c61049505a6b06dce3e7b/Microsoft_Defender_for_Endpoint_course_with_hands_on_sims.part1.rar.html
Read More

Badawy M Hands-On Monitoring and Alerting with Prometheus Best Practices 2025 | 6.13 MB
Title: Hands-On Monitoring and Alerting with Prometheus: Build Resilient, Real-time Monitoring and Alerting Systems using Prometheus, PromQL, and Proven Best Practices for Modern Infrastructure
Author: Muhammad Badawy
Read More

Hands-On Blockchain for Python Developers, 2nd Edition - Empowering Python developers | 7.09 MB
Title: Hands-On Blockchain for Python Developers
Author: Arjuna Sky Kok
Read More

Hands-On Ethical Hacking Tactics - Strategies, tools, and techniques for effective cyber defense | 22.5 MB
Title: Hands-On Ethical Hacking Tactics
Author: Shane Hartman
Read More

Raiturkar J Hands-On Software Architecture with Golang 2018 | 17.45 MB
Title: Hands-On Software Architecture with Golang: Design and architect highly scalable and robust applications using Go
Author: Jyotiswarup Raiturkar
Read More

Docker Introduction - Docker, Containers & Devops - Hands On
Last updated 3/2025
Created by James Spurin (Docker Captain / CNCF Ambassador / Kubestronaut),DiveInto Training
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English + subtitle | Duration: 23 Lectures ( 1h 38m ) | Size: 886 MB
Read More



