Microsoft Security Operations Analyst SC-200 Online Course
$5.00
Price: $ 5.00 USD | Size: 3.76 GB | Duration : 12+ Hours | 49 Video Lessons
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
Description
Price: $ 5.00 USD | Size: 3.76 GB | Duration : 12+ Hours | 49 Video Lessons
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
Microsoft Security Operations Analyst SC-200 Online Course
Introduction
001 Instructor Introduction
002 About the course
003 Configuring the Lab Environment
39791888-S1L2-About-the-course-Resources
39791902-S1L3-Configuring-the-Lab-Environment-Resource
39791904-Import-User-Sample
02 – Mitigate threats using Microsoft 365 Defender
001 Threat Protection with Microsoft 365 Defender
002 Incidents in Microsoft 365 Defender
003 Remediate risks with Microsoft Defender for O365
004 Microsoft Defender for Identity
005 Azure AD Identity Protection
006 Micrososft Defender for Cloud Apps
007 Respond to DLP Alerts
008 Manage Insider Risk Management in Microsoft 365
39791940-S2L1-Threat-Protection-with-Microsoft-365-Defender-Resource
39791946-S2L2-Incidents-in-Microsoft-365-Defender-Resource
39791950-S2L3-Remediate-risks-with-Microsoft-Defender-for-O365-Resource
39791952-S2L4-Microsoft-Defender-for-Identities-Resource
39791956-S2L5-Azure-AD-Identity-Protection-Resource
39791958-S2L6-Micrososft-Defender-for-Cloud-Apps-Resource
39791960-S2L7-Respond-to-DLP-Alerts-Resource
39791962-S2L8-Manage-Insider-Risk-Management-in-Microsoft-365-Resource
03 – Mitigate threats using Microsoft Defender for Endpoint
001 Protect against threats with Microsoft Defender for Endpoint
002 Deploy the Microsft Defender for Endpoint environment
003 Implement Windows Security Enhancements
004 Device Investigations
005 Perform actions on a device
006 Perform evidence and entities investigations
007 Configure and manage automation
008 Configure alerts and detections
009 Threat and Vulnerability Management
39792098-S3L1-Protect-against-threats-with-Microsoft-Defender-for-Endpoint-Resource
39792100-S3L2-Deploy-the-Microsft-Defender-for-Endpoint-environment-Resource
39792104-S3L3-Implement-Windows-Security-Enhancements-Resource
39792106-S3L4-Device-Investigations-Resource
39792108-S3L5-Perform-actions-on-a-device-Resource
39792112-S3L6-Perform-evidence-and-entities-investigations-Resource
39792116-S3L7-Configure-and-manage-automation-Resource
39792120-S3L8-Configure-alerts-and-detections-Resource
39792122-S3L9-Threat-and-Vulnerability-Management-Resource
04 – Mitigate threats using Microsoft Defender for Cloud
001 Plan for cloud workload protections using Microsoft Defender for Cloud
002 Cloud workload protections in Microsoft Defender for Cloud
003 Connect Azure Assets To Microsoft Defender for Cloud
004 Connect non-Azure resources to Microsoft Defender for Cloud
005 Security Alerts in Microsoft Defender for Cloud
39792252-S4L5-Security-Alerts-in-Microsoft-Defender-for-Cloud-Resource
05 – Kusto Query Language queries for Microsoft Sentinel
001 Construct KQL statements for Microsoft Sentinel
002 Analyze query results
003 Build Multi-Table queries in KQL
004 Work with string data using KQL
39792390-S5L1-Construct-KQL-statements-for-Microsoft-Sentinel-DEMO-queries
39792394-S5L1-Construct-KQL-statements-for-Microsoft-Sentinel-Resource
39792400-S5L2-Analyze-query-results-DEMO-queries
39792404-S5L2-Analyze-query-results-Resource
39792406-S5L3-Build-Multi-Table-queries-in-KQL-DEMO-queries
39792408-S5L3-Build-Multi-Table-queries-in-KQL-Resource
39792410-S5L4-Work-with-string-data-using-KQL-DEMO-queries
39792412-S5L4-Work-with-string-data-using-KQL-Resource
06 – Configure Microsoft Sentinel
001 Microsoft Sentinel Overview
002 Create and Manage Microsoft Sentinel workspaces
003 Query logs in Microsoft Sentinel
004 Use Watchlists in Microsoft Sentinel
005 Use Threat Intelligence in Microsoft Sentinel
39792546-S6L1-Microsoft-Sentinel-Overview-Resource
39792550-S6L2-Create-and-Manage-Microsoft-Sentinel-workspaces-Resource
39792552-S6L3-Query-logs-in-Microsoft-Sentinel-Resource
39792556-S6L4-Use-Watchlists-in-Microsoft-Sentinel-Resource
39792558-S6L5-Use-Threat-Intelligence-in-Microsoft-Sentinel-Resource
07 – Connect logs to Microsoft Sentinel
001 Connect Data to Microsoft Sentinel using Data Connectors
002 Connect Microsoft 365 Defender to Microsoft Sentinel
003 Connect Microsoft Services to Microsoft Sentinel
004 Connect Windows Hosts to Microsoft Sentinel
005 Connect CEF logs to Microsoft Sentinel
006 Connect Syslog data to Microsoft Sentinel
007 Connect Threat Indicators to Microsoft Sentinel
39792666-S7L1-Connect-Data-to-Microsoft-Sentinel-using-Data-Connectors-Resource
39792668-S7L2-Connect-Microsoft-365-Defender-to-Microsoft-Sentinel-Resource
39792672-S7L3-Connect-Microsoft-Services-to-Microsoft-Sentinel-Resource
39792676-S7L4-Connect-Windows-Hosts-to-Microsoft-Sentinel-Resource
39792678-S7L5-Connect-CEF-logs-to-Microsoft-Sentinel-Resource
39792680-S7L6-Connect-Syslog-data-to-Microsoft-Sentinel-Resource
39792682-S7L7-Connect-Threat-Indicators-to-Microsoft-Sentinel-Resource
08 – Detections and investigations using Microsoft Sentinel
001 Threat Detection with Microsoft Sentinel Analytics
002 Security Incident managent in Microsoft Sentinel
003 Threat Response with Microsoft Sentinel Playbooks
004 Entity Behaviour Analytics in Microsoft Sentinel
005 Workbooks in Microsoft Sentinel
39792756-S8L1-Threat-Detection-with-Microsoft-Sentinel-Analytics-Resource
39792764-S8L2-Security-Incident-managent-in-Microsoft-Sentinel-Resource
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.