Welcome to Expert Training The Online Course Shop!
-50%

Microsoft Security Operations Analyst SC-200 Online Course

$5.00

Price: $ 5.00 USD | Size: 3.76 GB | Duration : 12+ Hours | 49 Video Lessons

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

OR

Add to Wishlist
Add to Wishlist

Description

Price: $ 5.00 USD | Size: 3.76 GB | Duration : 12+ Hours | 49 Video Lessons

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

 

Microsoft Security Operations Analyst SC-200 Online Course

 

Introduction

001 Instructor Introduction

002 About the course

003 Configuring the Lab Environment

 

39791888-S1L2-About-the-course-Resources

39791902-S1L3-Configuring-the-Lab-Environment-Resource

39791904-Import-User-Sample

 

02 – Mitigate threats using Microsoft 365 Defender

 

001 Threat Protection with Microsoft 365 Defender

002 Incidents in Microsoft 365 Defender

003 Remediate risks with Microsoft Defender for O365

004 Microsoft Defender for Identity

005 Azure AD Identity Protection

006 Micrososft Defender for Cloud Apps

007 Respond to DLP Alerts

008 Manage Insider Risk Management in Microsoft 365

 

39791940-S2L1-Threat-Protection-with-Microsoft-365-Defender-Resource

39791946-S2L2-Incidents-in-Microsoft-365-Defender-Resource

39791950-S2L3-Remediate-risks-with-Microsoft-Defender-for-O365-Resource

39791952-S2L4-Microsoft-Defender-for-Identities-Resource

39791956-S2L5-Azure-AD-Identity-Protection-Resource

39791958-S2L6-Micrososft-Defender-for-Cloud-Apps-Resource

39791960-S2L7-Respond-to-DLP-Alerts-Resource

39791962-S2L8-Manage-Insider-Risk-Management-in-Microsoft-365-Resource

 

03 – Mitigate threats using Microsoft Defender for Endpoint

001 Protect against threats with Microsoft Defender for Endpoint

002 Deploy the Microsft Defender for Endpoint environment

003 Implement Windows Security Enhancements

004 Device Investigations

005 Perform actions on a device

006 Perform evidence and entities investigations

007 Configure and manage automation

008 Configure alerts and detections

009 Threat and Vulnerability Management

 

39792098-S3L1-Protect-against-threats-with-Microsoft-Defender-for-Endpoint-Resource

39792100-S3L2-Deploy-the-Microsft-Defender-for-Endpoint-environment-Resource

39792104-S3L3-Implement-Windows-Security-Enhancements-Resource

39792106-S3L4-Device-Investigations-Resource

39792108-S3L5-Perform-actions-on-a-device-Resource

39792112-S3L6-Perform-evidence-and-entities-investigations-Resource

39792116-S3L7-Configure-and-manage-automation-Resource

39792120-S3L8-Configure-alerts-and-detections-Resource

39792122-S3L9-Threat-and-Vulnerability-Management-Resource

 

 

04 – Mitigate threats using Microsoft Defender for Cloud

001 Plan for cloud workload protections using Microsoft Defender for Cloud

002 Cloud workload protections in Microsoft Defender for Cloud

003 Connect Azure Assets To Microsoft Defender for Cloud

004 Connect non-Azure resources to Microsoft Defender for Cloud

005 Security Alerts in Microsoft Defender for Cloud

39792252-S4L5-Security-Alerts-in-Microsoft-Defender-for-Cloud-Resource

 

05 – Kusto Query Language queries for Microsoft Sentinel

001 Construct KQL statements for Microsoft Sentinel

002 Analyze query results

003 Build Multi-Table queries in KQL

004 Work with string data using KQL

 

39792390-S5L1-Construct-KQL-statements-for-Microsoft-Sentinel-DEMO-queries

39792394-S5L1-Construct-KQL-statements-for-Microsoft-Sentinel-Resource

39792400-S5L2-Analyze-query-results-DEMO-queries

39792404-S5L2-Analyze-query-results-Resource

39792406-S5L3-Build-Multi-Table-queries-in-KQL-DEMO-queries

39792408-S5L3-Build-Multi-Table-queries-in-KQL-Resource

39792410-S5L4-Work-with-string-data-using-KQL-DEMO-queries

39792412-S5L4-Work-with-string-data-using-KQL-Resource

 

 

06 – Configure Microsoft Sentinel

001 Microsoft Sentinel Overview

002 Create and Manage Microsoft Sentinel workspaces

003 Query logs in Microsoft Sentinel

004 Use Watchlists in Microsoft Sentinel

005 Use Threat Intelligence in Microsoft Sentinel

39792546-S6L1-Microsoft-Sentinel-Overview-Resource

39792550-S6L2-Create-and-Manage-Microsoft-Sentinel-workspaces-Resource

39792552-S6L3-Query-logs-in-Microsoft-Sentinel-Resource

39792556-S6L4-Use-Watchlists-in-Microsoft-Sentinel-Resource

39792558-S6L5-Use-Threat-Intelligence-in-Microsoft-Sentinel-Resource

 

 

07 – Connect logs to Microsoft Sentinel

001 Connect Data to Microsoft Sentinel using Data Connectors

002 Connect Microsoft 365 Defender to Microsoft Sentinel

003 Connect Microsoft Services to Microsoft Sentinel

004 Connect Windows Hosts to Microsoft Sentinel

005 Connect CEF logs to Microsoft Sentinel

006 Connect Syslog data to Microsoft Sentinel

007 Connect Threat Indicators to Microsoft Sentinel

 

39792666-S7L1-Connect-Data-to-Microsoft-Sentinel-using-Data-Connectors-Resource

39792668-S7L2-Connect-Microsoft-365-Defender-to-Microsoft-Sentinel-Resource

39792672-S7L3-Connect-Microsoft-Services-to-Microsoft-Sentinel-Resource

39792676-S7L4-Connect-Windows-Hosts-to-Microsoft-Sentinel-Resource

39792678-S7L5-Connect-CEF-logs-to-Microsoft-Sentinel-Resource

39792680-S7L6-Connect-Syslog-data-to-Microsoft-Sentinel-Resource

39792682-S7L7-Connect-Threat-Indicators-to-Microsoft-Sentinel-Resource

 

 

08 – Detections and investigations using Microsoft Sentinel

001 Threat Detection with Microsoft Sentinel Analytics

002 Security Incident managent in Microsoft Sentinel

003 Threat Response with Microsoft Sentinel Playbooks

004 Entity Behaviour Analytics in Microsoft Sentinel

005 Workbooks in Microsoft Sentinel

39792756-S8L1-Threat-Detection-with-Microsoft-Sentinel-Analytics-Resource

39792764-S8L2-Security-Incident-managent-in-Microsoft-Sentinel-Resource

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation
×
×

Cart