SC-200 Microsoft Security Operations Analyst
- Description
- Curriculum
- FAQ
- Reviews
This course is a complete preparation for the SC-200 exam. ( Including hands-on Labs)
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.
Don’t be left behind. Be ahead of the curve by getting certified as a Microsoft Security Operations Analyst, and be ready for the opportunity to advance your career.
All video lectures will cover all SC-200 exam topics and include hands on demonstrations on each topic.
The course has been structured to follow the exact official Microsoft training plan. So if you want to pass your exam on your first attempt hit the enroll button now and you will get:
· Video lectures on each topic of the exam with demos that fully prepare you for your exam as well as ensuring you can administer all Microsoft security services and tools like a Pro
· Review questions at the end of each section (quizz) to test your knowledge on the topics learned in the section
· LABS at the end of each section. The labs follow the official Microsoft training labs and they are designed so you can practice yourself at your own pace when you aren’t watching the videos. You will have step-by-step instructions available to complete each lab and instructions to prepare your lab environment and deploy the necesarry resources for the labs.
· Interactive pre-recorded demonstrations on some of the topics that cannot be covered in the lab environment
· Links to official Microsoft resources/blogs/videos for further documentation available for each lesson on each topic
This course curriculum follows the Microsoft’s SC-200 exam study areas:
· Mitigate threats using Microsoft 365 Defender (25-30%)
· Mitigate threats using Microsoft Defender for Cloud (25-30%)
· Mitigate threats using Microsoft Sentinel (40-45%)
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
-
4Threat Protection with Microsoft 365 Defender
-
5Incidents in Microsoft 365 Defender
-
6Remediate risks with Microsoft Defender for O365
-
7Microsoft Defender for Identity
-
8Azure AD Identity Protection
-
9Micrososft Defender for Cloud Apps
-
10Respond to DLP Alerts
-
11Manage Insider Risk Management in Microsoft 365
-
12Section 2 Review Questions
-
13Section 2 Hands-On Lab
-
14Protect against threats with Microsoft Defender for Endpoint
-
15Deploy the Microsft Defender for Endpoint environment
-
16Implement Windows Security Enhancements
-
17Device Investigations
-
18Perform actions on a device
-
19Perform evidence and entities investigations
-
20Configure and manage automation
-
21Configure alerts and detections
-
22Threat and Vulnerability Management
-
23Section 3 Review Questions
-
24Section 3 Hands-On Lab
-
25Plan for cloud workload protections using Microsoft Defender for Cloud
-
26Cloud workload protections in Microsoft Defender for Cloud
-
27Connect Azure Assets To Microsoft Defender for Cloud
-
28Connect non-Azure resources to Microsoft Defender for Cloud
-
29Security Alerts in Microsoft Defender for Cloud
-
30Section 4 Review Questions
-
31Section 4 Hands-On Lab
-
45Connect Data to Microsoft Sentinel using Data Connectors
-
46Connect Microsoft 365 Defender to Microsoft Sentinel
-
47Connect Microsoft Services to Microsoft Sentinel
-
48Connect Windows Hosts to Microsoft Sentinel
-
49Connect CEF logs to Microsoft Sentinel
-
50Connect Syslog data to Microsoft Sentinel
-
51Connect Threat Indicators to Microsoft Sentinel
-
52Section 7 Review Questions
-
53Section 7 Hands-On Lab
-
54Threat Detection with Microsoft Sentinel Analytics
-
55Security Incident managent in Microsoft Sentinel
-
56Threat Response with Microsoft Sentinel Playbooks
-
57Entity Behaviour Analytics in Microsoft Sentinel
-
58Workbooks in Microsoft Sentinel
-
59Section 8 Review Questions
-
60Section 8 Hands-On Lab