Companies Home Search Profile

Sc-200 Microsoft Security Operations Analyst by Christopher Nett

Focused View

8:12:42

11 View
  • 1 - Welcome About your Instructor.mp4
    00:33
  • 2 - Course Content SC200 Exam.mp4
    02:19
  • 3 - FAQs.html
  • 4 - IMPORTANT Defender M365 is now Defender XDR.html
  • 5 - Complexity and Cyber Security Challenges.mp4
    06:54
  • 6 - What is a SOC.mp4
    04:07
  • 7 - SOC Tier Model.mp4
    02:44
  • 8 - Cyber Security Incident Reponse Process.mp4
    02:33
  • 9 - EDR XDR SIEM SOAR.mp4
    02:41
  • 10 - Cloud Types.mp4
    01:56
  • 11 - Shared Responsibility Model.mp4
    03:07
  • 12 - Azure Resource Hierarchy.mp4
    02:13
  • 13 - The Microsoft Security Cosmos.mp4
    04:44
  • 14 - Defending Across Attack Chains.mp4
    04:23
  • 15 - Demo Install VirtualBox.mp4
    01:05
  • 16 - Demo Configure Kali Keyboard Layout.mp4
    01:04
  • 17 - Install Tor Browser on Kali.mp4
    01:30
  • 18 - Deployment Prerequisites for Sentinel.mp4
    01:05
  • 19 - Demo Create an Azure Resource Group for Sentinel.mp4
    01:14
  • 20 - Demo Create a Log Analytics Workspace.mp4
    01:39
  • 21 - Demo Create a Sentinel Workspace.mp4
    01:13
  • 22 - Demo Create an Azure Resource Group for Defender for Cloud.mp4
    00:54
  • 23 - Demo Enable All Plans in Defender for Cloud.mp4
    03:23
  • 24 - Demo Create Virtual Machines.mp4
    04:10
  • 25 - Demo Create a Storage Account.mp4
    02:07
  • 26 - Demo Create a SQL Database.mp4
    01:32
  • 27 - Demo Create an AKS Cluster.mp4
    01:17
  • 28 - Demo Create an Azure Key Vault.mp4
    00:51
  • 29 - What is Microsoft Defender for Cloud.mp4
    02:48
  • 30 - CSPM CWP.mp4
    02:24
  • 31 - What is CSPM.mp4
    01:32
  • 32 - CSPM Plans.mp4
    01:55
  • 33 - Asset Inventory.mp4
    01:15
  • 34 - Demo Asset Inventory.mp4
    04:08
  • 35 - Security Recommendations.mp4
    01:07
  • 36 - Demo Security Recommendations.mp4
    02:07
  • 37 - Secure Score.mp4
    01:32
  • 38 - Demo Secure Score.mp4
    01:25
  • 39 - Remediation.mp4
    02:36
  • 40 - Demo Remediation.mp4
    02:54
  • 41 - DevOps Security.mp4
    03:14
  • 42 - What is Defender for Servers.mp4
    03:01
  • 43 - Agents.mp4
    01:53
  • 44 - Threat Detection for OS Level.mp4
    01:40
  • 45 - Alerts for Windows Machines.mp4
    02:39
  • 46 - Alerts for Linux Machines.mp4
    02:19
  • 47 - Demo Brute Force SSH.mp4
    10:08
  • 48 - Defender for Cloud RBAC.mp4
    01:58
  • 49 - What is CWP.mp4
    01:35
  • 50 - Defender for Databases.mp4
    01:51
  • 51 - Defender for Storage.mp4
    04:01
  • 52 - Demo Defender for Storage.mp4
    06:13
  • 53 - Defender for Containers.mp4
    05:15
  • 54 - Demo Defender for Containers.mp4
    02:28
  • 55 - Defender for Key Vault.mp4
    03:20
  • 56 - Demo Defender for Key Vault.mp4
    01:39
  • 57 - Defender for Resource Manager.mp4
    02:39
  • 58 - Demo Defender for Resource Manager.mp4
    03:19
  • 59 - Azure Arc.mp4
    02:22
  • 60 - Demo Manage Alerts and Incidents.mp4
    03:03
  • 61 - Email Notifications.mp4
    01:50
  • 62 - Demo Create Suppression Rules.mp4
    03:08
  • 63 - Workflow Automation.mp4
    01:21
  • 64 - Demo Malware Scanning Response with Workflow Automation Azure Logic Apps.mp4
    07:00
  • 65 - Demo Generate Sample Alerts.mp4
    01:46
  • 66 - Azure RBAC Sentinel.mp4
    02:10
  • 67 - Demo Azure RBAC Sentinel.mp4
    02:47
  • 68 - Overview.mp4
    02:51
  • 69 - Typical data sources for a SIEM.mp4
    03:03
  • 70 - Demo Content Hub.mp4
    04:49
  • 71 - Demo Ingesting Threat Intelligence into Sentinel.mp4
    04:08
  • 72 - Demo Verify Threat Intelligence Log Ingestion.mp4
    01:26
  • 73 - Demo Ingesting Entra ID into Sentinel.mp4
    02:13
  • 74 - Demo Deploy Sentinel Training Lab.mp4
    01:50
  • 75 - AMA and DCR.mp4
    03:03
  • 76 - Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4
    07:36
  • 77 - Sentinel Workflow.mp4
    03:04
  • 78 - Analytic rules.mp4
    01:39
  • 79 - Demo Analytic Rules.mp4
    02:18
  • 80 - Scheduled Analytic Rules.mp4
    01:13
  • 81 - Demo Scheduled Analytic Rules Entra ID.mp4
    05:51
  • 82 - Demo Scheduled Analytic Rules Windows Security Events.mp4
    02:32
  • 83 - NearRealTimeRules NRT.mp4
    00:56
  • 84 - Demo NearRealTimeRules NRT.mp4
    02:20
  • 85 - Fusion.mp4
    01:28
  • 86 - Demo Fusion.mp4
    04:13
  • 87 - ML Behavior Analytics.mp4
    01:59
  • 88 - Demo ML Behavior Analytics.mp4
    02:28
  • 89 - Threat Intelligence Rules.mp4
    01:10
  • 90 - Demo Threat Intelligence Rules.mp4
    01:33
  • 91 - Microsoft Security Rules.mp4
    00:49
  • 92 - Demo Microsoft Security Rules.mp4
    01:07
  • 93 - Automation Capabilities in Sentinel.mp4
    03:27
  • 94 - Automation rules.mp4
    00:43
  • 95 - Demo Automation rules.mp4
    00:43
  • 96 - Playbooks.mp4
    01:12
  • 97 - Automation rules vs Playbooks.mp4
    02:13
  • 98 - Azure Logic Apps.mp4
    03:21
  • 99 - Demo Playbooks Azure Logic Apps.mp4
    06:47
  • 100 - Demo Playbook with MITRE ATTCK ChatGPT.mp4
    09:34
  • 101 - Sentinel REST API.mp4
    01:51
  • 102 - Demo Incident Dashboard.mp4
    08:26
  • 103 - Workbooks in Sentinel.mp4
    00:47
  • 104 - Demo Create Workbooks.mp4
    04:28
  • 105 - Overview on MITRE ATTCK.mp4
    02:55
  • 106 - Demo MITRE ATTCK.mp4
    07:04
  • 107 - Demo ATTCK in Sentinel.mp4
    02:59
  • 108 - What is Threat Hunting.mp4
    02:46
  • 109 - KQL 101.mp4
    09:51
  • 110 - Demo KQL 101.mp4
    10:08
  • 111 - Demo Threat Hunting in Sentinel.mp4
    02:43
  • 112 - Demo Hunt for Entra ID Events.mp4
    07:40
  • 113 - Notebooks.mp4
    01:31
  • 114 - Demo Notebooks with MSTICPy.mp4
    19:31
  • 115 - UEBA in Sentinel.mp4
    03:15
  • 116 - Demo UEBA in Sentinel.mp4
    07:10
  • 117 - What is XDR.mp4
    01:38
  • 118 - Demo Manage Incidents and Alerts.mp4
    04:41
  • 119 - Demo Secure Score.mp4
    02:01
  • 120 - What is Defender for Office 365.mp4
    01:15
  • 121 - Defender for Office 365 Edge Protection.mp4
    02:51
  • 122 - Defender for Office 365 Sender Intelligence.mp4
    04:37
  • 123 - Defender for Office 365 Content Filtering.mp4
    03:58
  • 124 - Defender for Office 365 Post Delivery Protection.mp4
    02:53
  • 125 - Demo Preset Security Policies.mp4
    05:59
  • 126 - Demo AntiPhishing Policy.mp4
    07:19
  • 127 - Demo AntiSpam Policy.mp4
    08:19
  • 128 - Demo AntiMalware Policy.mp4
    02:38
  • 129 - Demo Safe Attachments.mp4
    02:59
  • 130 - Demo Safe Links.mp4
    03:52
  • 131 - Demo Tenant AllowBlock Lists.mp4
    01:47
  • 132 - What is Defender for Cloud Apps.mp4
    02:38
  • 133 - Demo Cloud App Catalog.mp4
    05:44
  • 134 - Demo Cloud App Policies.mp4
    04:49
  • 135 - Purview.txt
  • 135 - What is Microsoft Purview.mp4
    02:25
  • 136 - Demo Data Loss Prevention Policies.mp4
    06:41
  • 136 - Purview.txt
  • 137 - Demo Insider Risk Policies.mp4
    06:40
  • 137 - Purview.txt
  • 138 - What is Defender for Endpoint.mp4
    02:10
  • 139 - Demo Management and Administration.mp4
    15:49
  • 140 - Demo Vulnerability Management.mp4
    04:31
  • 141 - Identities are the new security perimeter.mp4
    01:26
  • 142 - NTLM.mp4
    05:50
  • 143 - PasstheHash Attacks.mp4
    02:45
  • 144 - Kerberos.mp4
    04:34
  • 145 - PassTheTicket Attacks.mp4
    01:45
  • 146 - Brute Force Attacks.mp4
    03:07
  • 147 - Remote Code Execution Attacks.mp4
    01:47
  • 148 - What is Defender for Identity.mp4
    04:50
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 146
    • duration 8:12:42
    • Release Date 2024/04/23

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security