Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixed incorrect URLs #929

Merged
merged 1 commit into from
Dec 20, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
41 changes: 20 additions & 21 deletions Labs/ReadMe.md
Original file line number Diff line number Diff line change
Expand Up @@ -153,39 +153,38 @@ Advanced | 300+ | You have lots of experience and are looking to learn about adv
- [Exercise 2: Explore Attack Paths in your AWS Environment](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2020%20%E2%80%93Contextual%20Security%20capabilities%20for%20AWS%20using%20Defender%20CSPM.md#exercise-2-explore-attack-paths-in-your-aws-environment)
- [Exercise 3: Build query with Cloud Security Explorer](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2020%20%E2%80%93Contextual%20Security%20capabilities%20for%20AWS%20using%20Defender%20CSPM.md#exercise-3-build-query-with-cloud-security-explorer)

[**Module 21 - Contextual Security capabilities for GCP using Defender CSPM**](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2021%20%E2%80%93Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md)
- [Exercise 1: Preparing the GCP Environment for Defender CSPM plan](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2021%20%E2%80%93%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-1-preparing-the-gcp-environment-for-defender-cspm-plan)
- [Exercise 2: Explore Attack Paths in your AWS Environment](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2021%20%E2%80%93%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-2-explore-attack-paths-in-your-aws-environment)
- [Exercise 3: Build query with Cloud Security Explorer](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2021%20%E2%80%93%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-3-build-query-with-cloud-security-explorer)
[**Module 21 - Contextual Security capabilities for GCP using Defender CSPM**](./Modules/Module%2021%20–%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md)
- [Exercise 1: Preparing the GCP Environment for Defender CSPM plan](./Modules/Module%2021%20%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-1-preparing-the-gcp-environment-for-defender-cspm-plan)
- [Exercise 2: Explore Attack Paths in your AWS Environment](./Modules/Module%2021%20%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-2-explore-attack-paths-in-your-aws-environment)
- [Exercise 3: Build query with Cloud Security Explorer](./Modules/Module%2021%20%20Contextual%20Security%20capabilities%20for%20GCP%20using%20Defender%20CSPM.md#exercise-3-build-query-with-cloud-security-explorer)

[**Module 22 - Integration with Microsoft Defender for Endpoint**](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module-22-MDE-integration.md)
- [Exercise 1: Enable the integration with Microsoft Defender for Endpoint](./Modules/Module-22-MDE-integration.md#exercise-1-enable-the-integration-with-microsoft-defender-for-endpoint)
- [Exercise 2: Connect your on-premises servers via direct onboarding](./Modules/Module-22-MDE-integration.md#exercise-2-connect-your-on-premises-servers-via-direct-onboarding)
- [Exercise 3: Analyze vulnerability assessment findings in custom workbooks](./Modules/Module-22-MDE-integration.md#exercise-3-analyze-vulnerability-assessment-findings-in-custom-workbooks)

[**Module 23 - Data-aware security posture**](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md)
- [Exercise 1: Enabling sensitive data discovery](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#exercise-1-enabling-sensitive-data-discovery)
- [(Optional) Exercise 2: Enabling sensitive data discovery for AWS and GCP](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#optional-exercise-2-enabling-sensitive-data-discovery-for-aws-and-gcp)
- [Exercise 3: Configure sensitive data categories](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#data-sensitivity-settings)
- [(Optional) Exercise 4: Import and configure custom sensitive info types and sensitivity labels](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#optional-exercise-4-import-and-configure-custom-sensitive-info-types-and-sensitivity-labels)
- [Exercise 5: Upload sensitive data](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#exercise-5-upload-sensitive-data)
- [Exercise 6: Explore risks with Cloud Security Explorer](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#exercise-6-explore-risks-with-cloud-security-explorer)
- [Exercise 7: Identify sensitive resources in Inventory](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#exercise-7-identify-sensitive-resources-in-inventory)
- [(Optional) Exercise 8: Explore risks through attack paths](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#exercise-7-identify-sensitive-resources-in-inventory)
- [(Optional) Exercise 9: Explore sensitive data security alerts](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#optional-exercise-9-explore-sensitive-data-security-alerts)
- [(Optional) Exercise 10: Data security dashboard investigation](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2023%20-%20Data%20Aware%20Security%20Posture.md#optional-exercise-9-explore-sensitive-data-security-alerts)
[**Module 23 - Data-aware security posture**](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md)
- [Exercise 1: Enabling sensitive data discovery](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#exercise-1-enabling-sensitive-data-discovery)
- [(Optional) Exercise 2: Enabling sensitive data discovery for AWS and GCP](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#optional-exercise-2-enabling-sensitive-data-discovery-for-aws-and-gcp)
- [Exercise 3: Configure sensitive data categories](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#optional-exercise-4-import-and-configure-custom-sensitive-info-types-and-sensitivity-labels)
- [Exercise 5: Upload sensitive data](./Modules/Module%2023%20-%20Data%20security%20posture%20management.mdexercise-5-upload-sensitive-data)
- [Exercise 6: Explore risks with Cloud Security Explorer](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#exercise-6-explore-risks-with-cloud-security-explorer)
- [Exercise 7: Identify sensitive resources in Inventory](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#exercise-7-identify-sensitive-resources-in-inventory)
- [(Optional) Exercise 8: Explore risks through attack paths](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#exercise-7-identify-sensitive-resources-in-inventory)
- [(Optional) Exercise 9: Explore sensitive data security alerts](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#optional-exercise-9-explore-sensitive-data-security-alerts)
- [(Optional) Exercise 10: Data security dashboard investigation](./Modules/Module%2023%20-%20Data%20security%20posture%20management.md#optional-exercise-9-explore-sensitive-data-security-alerts)

[**Module 24 - Security for AI Workloads**](./Modules/Module%2024%20-%20AI%20Workloads.md)
* [Exercise 1: Enable AI Workloads](./Modules/Module%2024%20-%20AI%20Workloads.md#Exercise-1:-Enable-AI-Workloads)
* [Exercise 2: Simulate Jailbreak Attacks](./Modules/Module%2024%20-%20AI%20Workloads.md#Exercise-2:-Simulate-Jailbreak-Attacks)

[**Module 25 - Defender XDR Integration**](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md)
[**Module 25 - Defender XDR Integration**](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md)

* [Exercise 1: Setting Up the Environment](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-1-setting-up-the-environment)
* [Exercise 2: Deploying the Attack Simulation](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-2-deploying-the-attack-simulation)
* [Exercise 3: Running Individual and Combined Attack Scenarios](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-3-running-individual-and-combined-attack-scenarios)
* [Exercise 4: Observing and Analyzing MDC Alerts](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-4-observing-and-analyzing-mdc-alerts)
* [Exercise 5: Correlating and Responding to Incidents Using XDR](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-5-correlating-and-responding-to-incidents-using-xdr)
* [Exercise 1: Setting Up the Environment](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-1-setting-up-the-environment)
* [Exercise 2: Deploying the Attack Simulation](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-2-deploying-the-attack-simulation)
* [Exercise 3: Running Individual and Combined Attack Scenarios](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-3-running-individual-and-combined-attack-scenarios)
* [Exercise 4: Observing and Analyzing MDC Alerts](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-4-observing-and-analyzing-mdc-alerts)
* [Exercise 5: Correlating and Responding to Incidents Using XDR](./Modules/Module%2025%20-%20Defender%20XDR%20Integration.md#step-5-correlating-and-responding-to-incidents-using-xdr)

[**Begin the labs here >**](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/main/Labs/Modules/Module-1-Preparing-the-Environment.md)

Expand Down
Loading