Secure Your Applications - Unified Visibility and Posture Management with Microsoft Defender for Cloud - BRK263

Secure Your Applications - Unified Visibility and Posture Management with Microsoft Defender for Cloud - BRK263

Microsoft Ignite via YouTube Direct link

0:00 - Breach event and realization of security weaknesses

1 of 9

1 of 9

0:00 - Breach event and realization of security weaknesses

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Secure Your Applications - Unified Visibility and Posture Management with Microsoft Defender for Cloud - BRK263

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0:00 - Breach event and realization of security weaknesses
  2. 2 00:05:09 - Key security challenge: lack of visibility and increasing sophistication of attacks
  3. 3 00:07:50 - Introducing Microsoft Defender for Cloud as the solution
  4. 4 00:13:42 - Need for Smart Mitigation and Prioritization of Threats
  5. 5 00:16:07 - Overview of Modern Security Challenges and Attack Surface
  6. 6 00:19:25 - Transition to James’ Demo on DevOps Security
  7. 7 00:27:01 - Phase 5: Preventing Risky Containers from Deployment
  8. 8 00:34:12 - Integrating Defender for Cloud CLI during image build process
  9. 9 00:39:42 - Conclusion: unified multi-cloud security and proactive protection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.