Free
SC-200 Microsoft Security Operations Analyst
Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.
8
H
20
M
Time
advanced
difficulty
8
ceu/cpe
Course Content
Connecting Event and Sys Logs
Implementing Data Connectors in Microsoft Sentinel
Configuring Watchlist
Design and Configure Microsoft Sentinel
Security Alerts in Microsoft Defender
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Investigate Files, Domains, and User Accounts
Mitigating Threats Using Microsoft Defender for Endpoint
Remediate Risks Using Microsoft 365 Defender
Mitigating Threats Using Microsoft 365 Defender
Connecting Threat Intelligence Platforms Connector
Implementing Data Connectors in Microsoft Sentinel
Microsoft Sentinel Content Hub Demonstration
Understanding Threat Detection with Microsoft Sentinel
How to Utilize Threat Intelligence
Design and Configure Microsoft Sentinel
Plan for Compliance Requirements
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Implementing Microsoft Defender for Identity
Mitigating Threats Using Microsoft 365 Defender
Configuring Alerts and Automation
Mitigating Threats Using Microsoft Defender for Endpoint
Module 7 Review Questions
Understanding Threat Detection with Microsoft Sentinel
Module 6 Review Questions
Implementing Data Connectors in Microsoft Sentinel
Module 5 Review Questions
Design and Configure Microsoft Sentinel
Module 4 Review Questions
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Module 3 Review Questions
Mitigating Threats Using Microsoft Defender for Endpoint
Implementing Microsoft Defender for Cloud App
Mitigating Threats Using Microsoft 365 Defender
Implementing DLP Using Microsoft Defender
Mitigating Threats Using Microsoft 365 Defender
Plan and Implement Threat Protection with Microsoft Defender
Mitigating Threats Using Microsoft 365 Defender
Module 2 Review Questions
Mitigating Threats Using Microsoft 365 Defender
Course Description