SC-200: Microsoft Security Operations Analyst
Your Microsoft SC-200 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SC-200 certification test. Ace your Microsoft SC-200 at the first attempt and obtain the Microsoft Security Operations Analyst credential with ease.
Curriculum for SC-200 Video Course
Introduction
Video Name | Time | |
---|---|---|
1. Configuring the Lab Environment | 21:00 |
Video Name | Time | |
---|---|---|
1. Threat Protection with Microsoft 365 Defender | 14:00 | |
2. Incidents in Microsoft 365 Defender | 52:00 | |
3. Remediate risks with Microsoft Defender for O365 | 19:00 | |
4. Microsoft Defender for Identity | 15:00 | |
5. Azure AD Identity Protection | 20:00 | |
6. Micrososft Defender for Cloud Apps | 22:00 | |
7. Respond to DLP Alerts | 16:00 | |
8. Manage Insider Risk Management in Microsoft 365 | 19:00 |
Video Name | Time | |
---|---|---|
1. Protect against threats with Microsoft Defender for Endpoint | 9:00 | |
2. Deploy the Microsft Defender for Endpoint environment | 17:00 | |
3. Implement Windows Security Enhancements | 11:00 | |
4. Device Investigations | 23:00 | |
5. Perform actions on a device | 21:00 | |
6. Perform evidence and entities investigations | 11:00 | |
7. Configure and manage automation | 11:00 | |
8. Configure alerts and detections | 12:00 | |
9. Threat and Vulnerability Management | 16:00 |
Video Name | Time | |
---|---|---|
1. Plan for cloud workload protections using Microsoft Defender for Cloud | 22:00 | |
2. Cloud workload protections in Microsoft Defender for Cloud | 38:00 | |
3. Connect Azure Assets To Microsoft Defender for Cloud | 17:00 | |
4. Connect non-Azure resources to Microsoft Defender for Cloud | 17:00 | |
5. Security Alerts in Microsoft Defender for Cloud | 26:00 |
Video Name | Time | |
---|---|---|
1. Construct KQL statements for Microsoft Sentinel | 34:00 | |
2. Analyze query results | 16:00 | |
3. Build Multi-Table queries in KQL | 11:00 | |
4. Work with string data using KQL | 11:00 |
Video Name | Time | |
---|---|---|
1. Microsoft Sentinel Overview | 16:00 | |
2. Create and Manage Microsoft Sentinel workspaces | 18:00 | |
3. Query logs in Microsoft Sentinel | 7:00 | |
4. Use Watchlists in Microsoft Sentinel | 8:00 | |
5. Use Threat Intelligence in Microsoft Sentinel | 11:00 |
Video Name | Time | |
---|---|---|
1. Connect Data to Microsoft Sentinel using Data Connectors | 13:00 | |
2. Connect Microsoft 365 Defender to Microsoft Sentinel | 9:00 | |
3. Connect Microsoft Services to Microsoft Sentinel | 5:00 | |
4. Connect Windows Hosts to Microsoft Sentinel | 7:00 | |
5. Connect CEF logs to Microsoft Sentinel | 6:00 | |
6. Connect Syslog data to Microsoft Sentinel | 5:00 | |
7. Connect Threat Indicators to Microsoft Sentinel | 6:00 |
Video Name | Time | |
---|---|---|
1. Threat Detection with Microsoft Sentinel Analytics | 22:00 | |
2. Security Incident managent in Microsoft Sentinel | 16:00 | |
3. Threat Response with Microsoft Sentinel Playbooks | 26:00 | |
4. Entity Behaviour Analytics in Microsoft Sentinel | 12:00 | |
5. Workbooks in Microsoft Sentinel | 10:00 |
Video Name | Time | |
---|---|---|
1. Threat Hunting Concepts in Microsoft Sentinel | 10:00 | |
2. Threat Hunting with Microsoft Sentinel | 11:00 | |
3. Notebooks in Microsoft Sentinel | 11:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo