Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response
Author:by Pierre Thoor (Author)
ASIN:B0DK1HW2KX
Publisher finelybook 出版社:Packt Publishing
Edition 版本:N/A
Publication Date 出版日期:2024-12-20
Language 语言:English
Print Length 页数:380pages
ISBN-10:1835884482
ISBN-13:9781835884492
Book Description
About the Author
Pierre Thoor is a Microsoft MVP in security and a dedicated cybersecurity expert with a focus on identity protection and threat detection. As a first-time author, he shares his extensive knowledge in this book. Pierre hosts the Security Dojo Podcast and blogs at thoor.tech, where he explores Microsoft security topics. As an international speaker, he makes complex security subjects accessible to audiences worldwide. At Onevinn, Pierre delivers advanced security solutions that strengthen organizations’ defenses against cyber threats. He specializes in Microsoft Sentinel and Microsoft Defender XDR. Pierre is also an expert in Azure Governance, including the Cloud Adoption Framework and enterprise-scale landing zones, ensuring that security is integrated into every aspect of cloud adoption. With skills in DevOps practices, Kusto Query Language (KQL), and developing solutions with Bicep and PowerShell, he implements automation and infrastructure as code to enhance security operations. Pierre assists organizations in navigating the complexities of modern cybersecurity challenges.
下载地址
相关推荐
Advanced Data Analytics with AWS: Explore Data Analysis Concepts in the Cloud to Gain Meaningful Insights and Build Robust Data Engineering Workflows Across Diverse Data Sources
ROS Programming: Building Powerful Robots: Design, build and simulate complex robots using the Robot Operating System
Engineering Mathematics with MATLAB
Ethical Decision-Making Using Artificial Intelligence: Challenges, Solutions, and Applications
Microsoft Security Copilot: Master strategies for AI-driven cyber defense
Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies