TOIT Training

Intermediate

SC-200: Microsoft Security Operations Analyst

Overview
Curriculum

 

In this online training course, students will gain the knowledge and skills to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

 

Curriculum

  • 12 Sections
  • 34 Lessons
  • 14h Duration
Expand All
Defender for Endpoint
4 Lessons
  1. Overview
  2. Exploring the Dashboard
  3. Defender for Endpoint Security
  4. Defender for Endpoint Monitoring
M365 Defender
3 Lessons
  1. Overview
  2. Incidents and Alerts, Hunting, Vulnerability Management
  3. Email and Collaboration, Cloud Apps
Working with Defender for Cloud
1 Lesson
  1. Working with Defender for Cloud
Connecting and Onboarding Assets
5 Lessons
  1. Enable Auto Provisioning
  2. Adding a Non-Azure Server
  3. Adding Linux Machines
  4. Viewing Security Recommendations
  5. GCP, Alerts
 Alerts and Responses
4 Lessons
  1. Creating Logic Apps
  2. Adding a Workflow
  3. Exploring Suppressions Rules
  4. Creating a Suppression Rule 
Creating Queries Using Kusto Query Language
2 Lessons
  1. Overview
  2. Examples
Basic Configuration
3 Lessons
  1. Sentinel Overview and Initial Setup  
  2. Permissions, Roles and Log Analytics
  3. Data Connectors, Watchlists and Threat Intelligence
 Logging and Importing
1 Lesson
  1. Logging and Importing Overview and Example
Alerts and Investigation
3 Lessons
  1. Alerts and Investigation Overview  
  2. Exploring Alerts and Investigation 
  3. Alerts and Investigation Syslog
Sentinel Analytics
2 Lessons
  1. Sentinel Analytics Overview  
  2. Sentinel Analytics Rule Examples
Working with Microsoft Sentinel
3 Lessons
  1. Threat Response 
  2. Threat Response Setup 
  3. Security Incident Management
 Anomaly Detection and Hunting
3 Lessons
  1. Anomaly Rules  
  2. Threat Hunting Rules
  3. Hunting Queries

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

SC-200: Microsoft Security Operations Analyst
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)