From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Complete guide to Microsoft Copilot for Security: Introduction - Microsoft Security Copilot Tutorial
From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Complete guide to Microsoft Copilot for Security: Introduction
- Welcome to the Complete Guide to Microsoft Copilot for Security. My name is Joey Muniz. I am a security specialist at Microsoft. I've been in the industry for over two decades. I published multiple books, as well as have spoken at every major conference. I also have the blog, thesecurityblogger.com. And on the side, I'm a father of three and love the game of soccer, or football. The reason this course was created is because there is a lot of interest in taking security and AI and basically trying to find value in a security operation center, which Microsoft has released, Copilot for Security. There is no prerequisites for this course. You can be a nontechnical leader to a very technical, specific person within a SOC and still find value from this course. Know that generative AI and this technology's rapidly changing, so we do recommend any content from this course is valuable, but you may also want to see what the latest and greatest is, as things are constantly changing. With me, I have my buddy, Erik Snyder. - Thanks Joey. And I'm Erik Snyder, a GBB, or Global Black Belt, at Microsoft. And really, what that makes me is a ninja around cyber and AI. And I've been working with this system, Copilot for Security, since we brought together LLMs and cyber operations. Now, you can watch this course from the beginning to the end and understand the whole system of Copilot for Security, how it was built, how to use it, or you can tactically jump to a specific section that is what you're working on now. So we've tried to design this to help across the board. So if you're ready to get started, let's jump into the content.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Module 1: AI basics with Copilot for Security introduction5m 16s
-
(Locked)
Learning objectives36s
-
1.1 Welcome to your future with AI10m 40s
-
(Locked)
1.2 The business case and ROI10m 30s
-
(Locked)
1.3 Solving the cybersecurity problem11m 51s
-
(Locked)
1.4 Responsible AI, data privacy, and protection10m 21s
-
(Locked)
1.5 Security capabilities review15m 35s
-
(Locked)
1.6 Building your AI use cases11m 1s
-
(Locked)
-
-
(Locked)
Learning objectives48s
-
3.1 Introducing prompt engineering15m 13s
-
(Locked)
3.2 Tokens and why they matter7m 49s
-
(Locked)
3.3 Prompt engineering examples: Sentinel7m 7s
-
(Locked)
3.4 Prompt engineering examples: MDE2m 45s
-
(Locked)
3.5 Prompt engineering examples: MDTI and EASM6m 11s
-
(Locked)
3.6 Prompt engineering examples: Intune7m 21s
-
(Locked)
3.7 Nested prompts and promptbooks3m 4s
-
(Locked)
3.8 Nested prompt examples3m 48s
-
(Locked)
-
-
(Locked)
Learning objectives39s
-
(Locked)
6.1 Introduction to immersive experience13m 29s
-
6.2 Microsoft plugin review7m 49s
-
(Locked)
6.3 Third-party and custom plugin review10m 46s
-
(Locked)
6.4 Promptbooks12m 13s
-
(Locked)
6.5 Promptbook examples11m 18s
-
(Locked)
6.6 Developing custom promptbooks6m 32s
-
(Locked)
-
-
(Locked)
Learning objectives39s
-
7.1 Use case: Executive and technical summarization5m 25s
-
(Locked)
7.2 Use case: Cross technology analysis5m 7s
-
(Locked)
7.3 Use case: KQL code generation2m 52s
-
(Locked)
7.4 Use case: Threat hunting7m 21s
-
(Locked)
7.5 Use case: Incident response4m 16s
-
(Locked)
7.6 Use case: Vulnerability management6m 47s
-
(Locked)
-
-
(Locked)
Module 3: Launching Copilot for Security6m 37s
-
(Locked)
Learning objectives27s
-
(Locked)
8.1 Requirements for enabling Copilot: Part 18m 42s
-
(Locked)
8.2 Requirements for enabling Copilot: Part 27m 31s
-
(Locked)
8.3 Azure services12m 29s
-
(Locked)
8.4 Copilot for Security consumption model14m 43s
-
(Locked)
8.5 Copilot for Security scaling12m 39s
-
(Locked)
8.6 Copilot for Security and RBAC11m 51s
-
(Locked)
8.7 Developing a Go Live plan9m 35s
-
(Locked)
-
-
(Locked)
Learning objectives30s
-
(Locked)
9.1 Turning on Copilot11m 48s
-
(Locked)
9.2 Setting up Copilot for Security3m 22s
-
(Locked)
9.3 Testing embedded capabilities4m 21s
-
(Locked)
9.4 Enabling and testing immersive capabilities3m 5s
-
(Locked)
9.5 Session and sharing sessions1m 49s
-
(Locked)
9.6 Usage dashboard review1m 20s
-
(Locked)
9.7 Opening tickets and finding help2m 34s
-
(Locked)
-
-
(Locked)
Module 4: Extending Copilot for Security introduction27s
-
(Locked)
Learning objectives25s
-
(Locked)
10.1 Introduction to plugin development5m 12s
-
(Locked)
10.2 API-based plugins5m 6s
-
(Locked)
10.3 Logic Apps8m 52s
-
(Locked)
10.4 Upload your data files and knowledge3m 24s
-
(Locked)
10.5 Bring in your third-party vendor1m 33s
-
(Locked)
-
-
(Locked)
Learning objectives29s
-
(Locked)
11.1 Use case: Defanging websites5m 44s
-
(Locked)
11.2 UrlScan plugin3m 44s
-
(Locked)
11.3 Use case: Shodan plugin3m 30s
-
(Locked)
11.4 Use case: Virus Total plugin10m 55s
-
(Locked)
11.5 Logic App extended10m 38s
-
(Locked)
11.6 Use case: Loading a KB file6m 9s
-
(Locked)