Free
SC-200 Microsoft Security Operations Analyst
Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.
8
H
20
M
Time
advanced
difficulty
8
ceu/cpe
Course Content
Threat Hunting Concepts
Understanding Threat Hunting and KQL Queries
Introduction to Microsoft Sentinel Analytics Tool
Understanding Threat Detection with Microsoft Sentinel
Introduction to Different Types of Data Connectors
Implementing Data Connectors in Microsoft Sentinel
Provisioning Cloud Resources to Microsoft Defender
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Introduction to Microsoft Sentinel
Design and Configure Microsoft Sentinel
Introduction to Microsoft Defender for Endpoint
Mitigating Threats Using Microsoft Defender for Endpoint
Introduction to Microsoft 365 Defender
Mitigating Threats Using Microsoft 365 Defender
How to Use Automation for Threat Detection
Understanding Threat Detection with Microsoft Sentinel
Introduction to KQL Queries
Understanding Threat Hunting and KQL Queries
Configuring Microsoft Sentinel Workspace
Design and Configure Microsoft Sentinel
Connecting Microsoft 365 Defender to Microsoft Sentinel
Implementing Data Connectors in Microsoft Sentinel
Understanding Cloud Security Score and Standards
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Configuring Microsoft Defender for Endpoint
Mitigating Threats Using Microsoft Defender for Endpoint
Managing Threats in Microsoft 365 Defender
Mitigating Threats Using Microsoft 365 Defender
Introduction to SC-200 Certification
Introduction to Test Prep for SC-200
Working with KQL Queries
Understanding Threat Hunting and KQL Queries
Introduction to Data Normalization
Understanding Threat Detection with Microsoft Sentinel
Understanding Tables and Logs in Microsoft Sentinel
Design and Configure Microsoft Sentinel
Connecting Windows Host Machines
Implementing Data Connectors in Microsoft Sentinel
Implementing Workload Protection
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Performing Device Investigation
Mitigating Threats Using Microsoft Defender for Endpoint
SC-200 Syllabus and Question Distribution
Introduction to Test Prep for SC-200
Managing Incidents in Microsoft 365 Defender
Mitigating Threats Using Microsoft 365 Defender
Module 8 Review Questions
Understanding Threat Hunting and KQL Queries
Visualizing and Managing Data in Sentinel
Understanding Threat Detection with Microsoft Sentinel
Course Description