{"id":316,"date":"2021-05-15T16:05:00","date_gmt":"2021-05-15T16:05:00","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=316"},"modified":"2021-05-24T17:44:50","modified_gmt":"2021-05-24T17:44:50","slug":"how-to-become-a-microsoft-security%f0%9f%9b%a1%ef%b8%8f-ninja-%e2%9a%94","status":"publish","type":"post","link":"https:\/\/www.thecloudmarathoner.com\/index.php\/2021\/05\/15\/how-to-become-a-microsoft-security%f0%9f%9b%a1%ef%b8%8f-ninja-%e2%9a%94\/","title":{"rendered":"How to become a Microsoft Security\ud83d\udee1\ufe0f Ninja \u2694 ???"},"content":{"rendered":"\n<p>Hello friends,<\/p>\n\n\n\n<p>Recently, I have been asked about good refences to master security echo-system on Microsoft technologies, especially in Cloud security products and services. Thus, I dived into references and compiled following  resources for everyone to enjoy \ud83d\udc4d\ud83d\udc4c<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"722\" src=\"\/wp-content\/uploads\/2021\/05\/ninjacat_trex_inline-01_1600.jpg\" alt=\"\" class=\"wp-image-317\" srcset=\"\/wp-content\/uploads\/2021\/05\/ninjacat_trex_inline-01_1600.jpg 999w, \/wp-content\/uploads\/2021\/05\/ninjacat_trex_inline-01_1600-300x217.jpg 300w, \/wp-content\/uploads\/2021\/05\/ninjacat_trex_inline-01_1600-768x555.jpg 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Learn about basic to advanced scenarios on network security, MCAS, Defender, Office365 and other security\ud83d\udee1\ufe0f\ud83d\udd10 services on <a href=\"https:\/\/azure.microsoft.com\/en-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure<\/a><a href=\"https:\/\/www.linkedin.com\/feed\/#\"> <\/a>&#8211; from following collection of blog posts:\u00a0<\/p>\n\n\n\n<p>\u2714\ufe0f Microsoft Cloud App Security Ninja Training\u00a0 <a href=\"https:\/\/aka.ms\/MCASNinja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/MCASNinja<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Microsoft Defender for Endpoint Ninja Training\u00a0 <a href=\"https:\/\/aka.ms\/MDENinja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/MDENinja<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Azure Network Security Ninja Training\u00a0<a href=\"https:\/\/lnkd.in\/g9qeMrT\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lnkd.in\/g9qeMrT<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Azure Security Center Ninja Training\u00a0 <a href=\"https:\/\/aka.ms\/ASCNinja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/ASCNinja<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Azure Sentinel Ninja Training <a href=\"https:\/\/lnkd.in\/gpZb7kS\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lnkd.in\/gpZb7kS<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Microsoft 365 Defender Ninja Training\u00a0 <a href=\"https:\/\/aka.ms\/M365Ninja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/M365Ninja<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Microsoft Defender for Identity Ninja Training\u00a0<a href=\"https:\/\/aka.ms\/DFINinja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/DFINinja<\/a><\/p>\n\n\n\n<p>\u2714\ufe0f Microsoft Defender for Office 365 Ninja Training\u00a0<a href=\"https:\/\/aka.ms\/MDONinja\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/MDONinja<\/a><\/p>\n\n\n\n<p>In addition, you could easily join to the Microsoft Security Community, and get latest announcement from here: <a href=\"https:\/\/lnkd.in\/gXdv7Sq\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lnkd.in\/gXdv7Sq<\/a><\/p>\n\n\n\n<p>Stay tuned &#8230;. for upcoming announcements on Microsoft Azure, as all of them will be shared back here \ud83d\ude18<\/p>\n\n\n\n<p><strong>#microsoftazure<\/strong> <strong>#continuouslearning<\/strong> <strong>#cybersecurity<\/strong>&nbsp;<strong>#networksecurity<\/strong>&nbsp;<strong>#informationsecurity<\/strong>&nbsp;<strong>#cloudsecurity<\/strong><\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_316\" class=\"pvc_stats all  \" data-element-id=\"316\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello friends, Recently, I have been asked about good refences to master security echo-system on Microsoft technologies, especially in Cloud security products and services. Thus, I dived into references and compiled following resources for everyone to enjoy \ud83d\udc4d\ud83d\udc4c Learn about basic to advanced scenarios on network security, MCAS, Defender, Office365 and other security\ud83d\udee1\ufe0f\ud83d\udd10 services on &hellip; <a href=\"https:\/\/www.thecloudmarathoner.com\/index.php\/2021\/05\/15\/how-to-become-a-microsoft-security%f0%9f%9b%a1%ef%b8%8f-ninja-%e2%9a%94\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to become a Microsoft Security\ud83d\udee1\ufe0f Ninja \u2694 ???&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,15],"tags":[],"class_list":["post-316","post","type-post","status-publish","format-standard","hentry","category-microsoft-learn","category-security-governance"],"_links":{"self":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":5,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/316\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}