Sc-200 Microsoft Security Operations Analyst by Christopher Nett
Focused View
8:12:42
11 View
1 - Welcome About your Instructor.mp4
00:33
2 - Course Content SC200 Exam.mp4
02:19
3 - FAQs.html
4 - IMPORTANT Defender M365 is now Defender XDR.html
5 - Complexity and Cyber Security Challenges.mp4
06:54
6 - What is a SOC.mp4
04:07
7 - SOC Tier Model.mp4
02:44
8 - Cyber Security Incident Reponse Process.mp4
02:33
9 - EDR XDR SIEM SOAR.mp4
02:41
10 - Cloud Types.mp4
01:56
11 - Shared Responsibility Model.mp4
03:07
12 - Azure Resource Hierarchy.mp4
02:13
13 - The Microsoft Security Cosmos.mp4
04:44
14 - Defending Across Attack Chains.mp4
04:23
15 - Demo Install VirtualBox.mp4
01:05
16 - Demo Configure Kali Keyboard Layout.mp4
01:04
17 - Install Tor Browser on Kali.mp4
01:30
18 - Deployment Prerequisites for Sentinel.mp4
01:05
19 - Demo Create an Azure Resource Group for Sentinel.mp4
01:14
20 - Demo Create a Log Analytics Workspace.mp4
01:39
21 - Demo Create a Sentinel Workspace.mp4
01:13
22 - Demo Create an Azure Resource Group for Defender for Cloud.mp4
00:54
23 - Demo Enable All Plans in Defender for Cloud.mp4
03:23
24 - Demo Create Virtual Machines.mp4
04:10
25 - Demo Create a Storage Account.mp4
02:07
26 - Demo Create a SQL Database.mp4
01:32
27 - Demo Create an AKS Cluster.mp4
01:17
28 - Demo Create an Azure Key Vault.mp4
00:51
29 - What is Microsoft Defender for Cloud.mp4
02:48
30 - CSPM CWP.mp4
02:24
31 - What is CSPM.mp4
01:32
32 - CSPM Plans.mp4
01:55
33 - Asset Inventory.mp4
01:15
34 - Demo Asset Inventory.mp4
04:08
35 - Security Recommendations.mp4
01:07
36 - Demo Security Recommendations.mp4
02:07
37 - Secure Score.mp4
01:32
38 - Demo Secure Score.mp4
01:25
39 - Remediation.mp4
02:36
40 - Demo Remediation.mp4
02:54
41 - DevOps Security.mp4
03:14
42 - What is Defender for Servers.mp4
03:01
43 - Agents.mp4
01:53
44 - Threat Detection for OS Level.mp4
01:40
45 - Alerts for Windows Machines.mp4
02:39
46 - Alerts for Linux Machines.mp4
02:19
47 - Demo Brute Force SSH.mp4
10:08
48 - Defender for Cloud RBAC.mp4
01:58
49 - What is CWP.mp4
01:35
50 - Defender for Databases.mp4
01:51
51 - Defender for Storage.mp4
04:01
52 - Demo Defender for Storage.mp4
06:13
53 - Defender for Containers.mp4
05:15
54 - Demo Defender for Containers.mp4
02:28
55 - Defender for Key Vault.mp4
03:20
56 - Demo Defender for Key Vault.mp4
01:39
57 - Defender for Resource Manager.mp4
02:39
58 - Demo Defender for Resource Manager.mp4
03:19
59 - Azure Arc.mp4
02:22
60 - Demo Manage Alerts and Incidents.mp4
03:03
61 - Email Notifications.mp4
01:50
62 - Demo Create Suppression Rules.mp4
03:08
63 - Workflow Automation.mp4
01:21
64 - Demo Malware Scanning Response with Workflow Automation Azure Logic Apps.mp4
07:00
65 - Demo Generate Sample Alerts.mp4
01:46
66 - Azure RBAC Sentinel.mp4
02:10
67 - Demo Azure RBAC Sentinel.mp4
02:47
68 - Overview.mp4
02:51
69 - Typical data sources for a SIEM.mp4
03:03
70 - Demo Content Hub.mp4
04:49
71 - Demo Ingesting Threat Intelligence into Sentinel.mp4
04:08
72 - Demo Verify Threat Intelligence Log Ingestion.mp4
01:26
73 - Demo Ingesting Entra ID into Sentinel.mp4
02:13
74 - Demo Deploy Sentinel Training Lab.mp4
01:50
75 - AMA and DCR.mp4
03:03
76 - Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4
07:36
77 - Sentinel Workflow.mp4
03:04
78 - Analytic rules.mp4
01:39
79 - Demo Analytic Rules.mp4
02:18
80 - Scheduled Analytic Rules.mp4
01:13
81 - Demo Scheduled Analytic Rules Entra ID.mp4
05:51
82 - Demo Scheduled Analytic Rules Windows Security Events.mp4
02:32
83 - NearRealTimeRules NRT.mp4
00:56
84 - Demo NearRealTimeRules NRT.mp4
02:20
85 - Fusion.mp4
01:28
86 - Demo Fusion.mp4
04:13
87 - ML Behavior Analytics.mp4
01:59
88 - Demo ML Behavior Analytics.mp4
02:28
89 - Threat Intelligence Rules.mp4
01:10
90 - Demo Threat Intelligence Rules.mp4
01:33
91 - Microsoft Security Rules.mp4
00:49
92 - Demo Microsoft Security Rules.mp4
01:07
93 - Automation Capabilities in Sentinel.mp4
03:27
94 - Automation rules.mp4
00:43
95 - Demo Automation rules.mp4
00:43
96 - Playbooks.mp4
01:12
97 - Automation rules vs Playbooks.mp4
02:13
98 - Azure Logic Apps.mp4
03:21
99 - Demo Playbooks Azure Logic Apps.mp4
06:47
100 - Demo Playbook with MITRE ATTCK ChatGPT.mp4
09:34
101 - Sentinel REST API.mp4
01:51
102 - Demo Incident Dashboard.mp4
08:26
103 - Workbooks in Sentinel.mp4
00:47
104 - Demo Create Workbooks.mp4
04:28
105 - Overview on MITRE ATTCK.mp4
02:55
106 - Demo MITRE ATTCK.mp4
07:04
107 - Demo ATTCK in Sentinel.mp4
02:59
108 - What is Threat Hunting.mp4
02:46
109 - KQL 101.mp4
09:51
110 - Demo KQL 101.mp4
10:08
111 - Demo Threat Hunting in Sentinel.mp4
02:43
112 - Demo Hunt for Entra ID Events.mp4
07:40
113 - Notebooks.mp4
01:31
114 - Demo Notebooks with MSTICPy.mp4
19:31
115 - UEBA in Sentinel.mp4
03:15
116 - Demo UEBA in Sentinel.mp4
07:10
117 - What is XDR.mp4
01:38
118 - Demo Manage Incidents and Alerts.mp4
04:41
119 - Demo Secure Score.mp4
02:01
120 - What is Defender for Office 365.mp4
01:15
121 - Defender for Office 365 Edge Protection.mp4
02:51
122 - Defender for Office 365 Sender Intelligence.mp4
04:37
123 - Defender for Office 365 Content Filtering.mp4
03:58
124 - Defender for Office 365 Post Delivery Protection.mp4
02:53
125 - Demo Preset Security Policies.mp4
05:59
126 - Demo AntiPhishing Policy.mp4
07:19
127 - Demo AntiSpam Policy.mp4
08:19
128 - Demo AntiMalware Policy.mp4
02:38
129 - Demo Safe Attachments.mp4
02:59
130 - Demo Safe Links.mp4
03:52
131 - Demo Tenant AllowBlock Lists.mp4
01:47
132 - What is Defender for Cloud Apps.mp4
02:38
133 - Demo Cloud App Catalog.mp4
05:44
134 - Demo Cloud App Policies.mp4
04:49
135 - Purview.txt
135 - What is Microsoft Purview.mp4
02:25
136 - Demo Data Loss Prevention Policies.mp4
06:41
136 - Purview.txt
137 - Demo Insider Risk Policies.mp4
06:40
137 - Purview.txt
138 - What is Defender for Endpoint.mp4
02:10
139 - Demo Management and Administration.mp4
15:49
140 - Demo Vulnerability Management.mp4
04:31
141 - Identities are the new security perimeter.mp4
01:26
142 - NTLM.mp4
05:50
143 - PasstheHash Attacks.mp4
02:45
144 - Kerberos.mp4
04:34
145 - PassTheTicket Attacks.mp4
01:45
146 - Brute Force Attacks.mp4
03:07
147 - Remote Code Execution Attacks.mp4
01:47
148 - What is Defender for Identity.mp4
04:50
More details
User Reviews
Rating
average 0
Focused display

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 146
- duration 8:12:42
- Release Date 2024/04/23