From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Learning objectives - Microsoft Security Copilot Tutorial
From the course: Complete Guide to Microsoft Copilot for Security: Empower and Protect the Security Operations Center (SOC) by Microsoft Press
Learning objectives
- Welcome to our next lesson, where we'll talk about prompt engineering. And this is an important topic when it comes to cyber and how you use Copilot for security. So go through what prompt engineering is, the tokens and why they matter, what a token is. We'll give you some examples of what prompts should look like, and then how to build those into nested prompts or prompt books. And then we'll give you examples of where you can find additional prompt books in the community or where you can contribute and publish them out as well. So let's start looking at prompt engineering.
Contents
-
-
-
-
-
(Locked)
Learning objectives48s
-
3.1 Introducing prompt engineering15m 13s
-
(Locked)
3.2 Tokens and why they matter7m 49s
-
(Locked)
3.3 Prompt engineering examples: Sentinel7m 7s
-
(Locked)
3.4 Prompt engineering examples: MDE2m 45s
-
(Locked)
3.5 Prompt engineering examples: MDTI and EASM6m 11s
-
(Locked)
3.6 Prompt engineering examples: Intune7m 21s
-
(Locked)
3.7 Nested prompts and promptbooks3m 4s
-
(Locked)
3.8 Nested prompt examples3m 48s
-
(Locked)
-
-
-
-
-
-
-
-
-
-