Companies Home Search Profile

SC-200 Microsoft Security Operations Analyst

Focused View

IT New Courses

12:47:14

158 View
  • 001 Instructor Introduction.mp4
    01:43
  • 002 About the course.mp4
    15:55
  • 003 Configuring the Lab Environment.mp4
    21:27
  • 39791888-s1l2-about-the-course-resources.zip
  • 39791902-s1l3-configuring-the-lab-environment-resource.zip
  • 39791904-Import-User-Sample.csv
  • 001 Threat Protection with Microsoft 365 Defender.mp4
    14:13
  • 002 Incidents in Microsoft 365 Defender.mp4
    52:11
  • 003 Remediate risks with Microsoft Defender for O365.mp4
    18:59
  • 004 Microsoft Defender for Identity.mp4
    15:18
  • 005 Azure AD Identity Protection.mp4
    19:35
  • 006 Micrososft Defender for Cloud Apps.mp4
    21:58
  • 007 Respond to DLP Alerts.mp4
    16:29
  • 008 Manage Insider Risk Management in Microsoft 365.mp4
    19:20
  • 39791940-s2l1-threat-protection-with-microsoft-365-defender-resource.zip
  • 39791946-s2l2-incidents-in-microsoft-365-defender-resource.zip
  • 39791950-s2l3-remediate-risks-with-microsoft-defender-for-o365-resource.zip
  • 39791952-s2l4-microsoft-defender-for-identities-resource.zip
  • 39791956-s2l5-azure-ad-identity-protection-resource.zip
  • 39791958-s2l6-micrososft-defender-for-cloud-apps-resource.zip
  • 39791960-s2l7-respond-to-dlp-alerts-resource.zip
  • 39791962-s2l8-manage-insider-risk-management-in-microsoft-365-resource.zip
  • 001 Protect against threats with Microsoft Defender for Endpoint.mp4
    08:33
  • 002 Deploy the Microsft Defender for Endpoint environment.mp4
    17:27
  • 003 Implement Windows Security Enhancements.mp4
    10:52
  • 004 Device Investigations.mp4
    23:12
  • 005 Perform actions on a device.mp4
    21:18
  • 006 Perform evidence and entities investigations.mp4
    10:38
  • 007 Configure and manage automation.mp4
    11:13
  • 008 Configure alerts and detections.mp4
    12:21
  • 009 Threat and Vulnerability Management.mp4
    16:01
  • 39792098-s3l1-protect-against-threats-with-microsoft-defender-for-endpoint-resource.zip
  • 39792100-s3l2-deploy-the-microsft-defender-for-endpoint-environment-resource.zip
  • 39792104-s3l3-implement-windows-security-enhancements-resource.zip
  • 39792106-s3l4-device-investigations-resource.zip
  • 39792108-s3l5-perform-actions-on-a-device-resource.zip
  • 39792112-s3l6-perform-evidence-and-entities-investigations-resource.zip
  • 39792116-s3l7-configure-and-manage-automation-resource.zip
  • 39792120-s3l8-configure-alerts-and-detections-resource.zip
  • 39792122-s3l9-threat-and-vulnerability-management-resource.zip
  • 001 Plan for cloud workload protections using Microsoft Defender for Cloud.mp4
    22:04
  • 002 Cloud workload protections in Microsoft Defender for Cloud.mp4
    38:22
  • 003 Connect Azure Assets To Microsoft Defender for Cloud.mp4
    16:48
  • 004 Connect non-Azure resources to Microsoft Defender for Cloud.mp4
    16:39
  • 005 Security Alerts in Microsoft Defender for Cloud.mp4
    26:20
  • 39792220-s4l1-plan-for-cloud-workload-protections-using-microsoft-defender-for-cloud-resources.zip
  • 39792238-s4l2-cloud-workload-protections-in-microsoft-defender-for-cloud-resource.zip
  • 39792242-s4l3-connect-azure-assets-to-microsoft-defender-for-cloud-resource.zip
  • 39792250-s4l4-connect-non-azure-resources-to-microsoft-defender-for-cloud-resource.zip
  • 39792252-s4l5-security-alerts-in-microsoft-defender-for-cloud-resource.zip
  • 001 Construct KQL statements for Microsoft Sentinel.mp4
    33:42
  • 002 Analyze query results.mp4
    15:31
  • 003 Build Multi-Table queries in KQL.mp4
    10:33
  • 004 Work with string data using KQL.mp4
    11:14
  • 39792390-s5l1-construct-kql-statements-for-microsoft-sentinel-demo-queries.zip
  • 39792394-s5l1-construct-kql-statements-for-microsoft-sentinel-resource.zip
  • 39792400-s5l2-analyze-query-results-demo-queries.zip
  • 39792404-s5l2-analyze-query-results-resource.zip
  • 39792406-s5l3-build-multi-table-queries-in-kql-demo-queries.zip
  • 39792408-s5l3-build-multi-table-queries-in-kql-resource.zip
  • 39792410-s5l4-work-with-string-data-using-kql-demo-queries.zip
  • 39792412-s5l4-work-with-string-data-using-kql-resource.zip
  • 001 Microsoft Sentinel Overview.mp4
    15:40
  • 002 Create and Manage Microsoft Sentinel workspaces.mp4
    17:35
  • 003 Query logs in Microsoft Sentinel.mp4
    06:52
  • 004 Use Watchlists in Microsoft Sentinel.mp4
    07:44
  • 005 Use Threat Intelligence in Microsoft Sentinel.mp4
    11:00
  • 39792546-s6l1-microsoft-sentinel-overview-resource.zip
  • 39792550-s6l2-create-and-manage-microsoft-sentinel-workspaces-resource.zip
  • 39792552-s6l3-query-logs-in-microsoft-sentinel-resource.zip
  • 39792556-s6l4-use-watchlists-in-microsoft-sentinel-resource.zip
  • 39792558-s6l5-use-threat-intelligence-in-microsoft-sentinel-resource.zip
  • 001 Connect Data to Microsoft Sentinel using Data Connectors.mp4
    12:55
  • 002 Connect Microsoft 365 Defender to Microsoft Sentinel.mp4
    08:54
  • 003 Connect Microsoft Services to Microsoft Sentinel.mp4
    04:35
  • 004 Connect Windows Hosts to Microsoft Sentinel.mp4
    07:17
  • 005 Connect CEF logs to Microsoft Sentinel.mp4
    05:57
  • 006 Connect Syslog data to Microsoft Sentinel.mp4
    04:33
  • 007 Connect Threat Indicators to Microsoft Sentinel.mp4
    06:24
  • 39792666-s7l1-connect-data-to-microsoft-sentinel-using-data-connectors-resource.zip
  • 39792668-s7l2-connect-microsoft-365-defender-to-microsoft-sentinel-resource.zip
  • 39792672-s7l3-connect-microsoft-services-to-microsoft-sentinel-resource.zip
  • 39792676-s7l4-connect-windows-hosts-to-microsoft-sentinel-resource.zip
  • 39792678-s7l5-connect-cef-logs-to-microsoft-sentinel-resource.zip
  • 39792680-s7l6-connect-syslog-data-to-microsoft-sentinel-resource.zip
  • 39792682-s7l7-connect-threat-indicators-to-microsoft-sentinel-resource.zip
  • 001 Threat Detection with Microsoft Sentinel Analytics.mp4
    22:10
  • 002 Security Incident managent in Microsoft Sentinel.mp4
    16:04
  • 003 Threat Response with Microsoft Sentinel Playbooks.mp4
    26:17
  • 004 Entity Behaviour Analytics in Microsoft Sentinel.mp4
    11:44
  • 005 Workbooks in Microsoft Sentinel.mp4
    10:28
  • 39792756-s8l1-threat-detection-with-microsoft-sentinel-analytics-resource.zip
  • 39792764-s8l2-security-incident-managent-in-microsoft-sentinel-resource.zip
  • 39792766-s8l3-threat-response-with-microsoft-sentinel-playbooks-resource.zip
  • 39792768-s8l4-entity-behaviour-analytics-in-microsoft-sentinel-resource.zip
  • 39792772-s8l5-workbooks-in-microsoft-sentinel-resource.zip
  • 001 Threat Hunting Concepts in Microsoft Sentinel.mp4
    09:33
  • 002 Threat Hunting with Microsoft Sentinel.mp4
    10:48
  • 003 Notebooks in Microsoft Sentinel.mp4
    10:48
  • 39792826-s9l1-threat-hunting-concepts-in-microsoft-sentinel-resource.zip
  • 39792828-s9l2-threat-hunting-with-microsoft-sentinel-resource.zip
  • 39792830-s9l3-notebooks-in-microsoft-sentinel-resource.zip
  • Description


    Learn all about Microsoft security services, Microsoft Sentinel, KQL, Microsoft 365 Defender suite and get certified

    What You'll Learn?


    • Explain how Microsoft Defender for Endpoint can remediate risks in your environment
    • Create a Microsoft Defender for Endpoint environment
    • Configure Attack Surface Reduction rules on Windows devices
    • Configure alert settings in Microsoft Defender for Endpoint
    • Conduct advanced hunting in Microsoft 365 Defender
    • Manage incidents in Microsoft 365 Defender
    • Investigate DLP alerts in Microsoft Defender for Cloud Apps
    • Explain the types of actions you can take on an insider risk management case
    • Configure Microsoft Defender for Cloud
    • Remediate alerts in Microsoft Defender for Cloud
    • Construct Kusto Query Language (KQL) statements
    • Extract data from unstructured string fields using KQL
    • Manage a Microsoft Sentinel workspace
    • Use KQL to access the watchlist in Microsoft Sentinel
    • Manage threat indicators in Microsoft Sentinel
    • Configure different data sources in Microsoft Sentinel

    Who is this for?


  • Security Operations Analysts or anyone aspiring to work in this role
  • Anyone working in IT with exposure to Security Operations
  • Any IT enthusiast who wants to learn about Microsoft Security technologies
  • Candidates for the SC-200 exam
  • What You Need to Know?


  • Basic understanding of Microsoft 365
  • Basic understanding of Microsoft security, compliance, and identity products
  • Intermediate understanding of Windows 10/11
  • Familiarity with Azure services
  • Familiarity with Azure virtual machines and virtual networking
  • Basic understanding of scripting concepts
  • More details


    Description

    This course is a complete preparation for the SC-200 exam. ( Including hands-on Labs)

    The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.

    Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.


    Don't be left behind. Be ahead of the curve by getting certified as a Microsoft Security Operations Analyst, and be ready for the opportunity to advance your career in Cybersecurity.

    All video lectures will cover all SC-200 exam topics and include hands on demonstrations on each topic.

    The course has been structured to follow the exact official Microsoft training plan. So if you want to pass your exam on your first attempt hit the enroll button now and you will get:

          · Video lectures on each topic of the exam with demos that fully prepare you for your exam as well as ensuring you can administer all Microsoft security services and tools like a Pro

          · Review questions at the end of each section (quizz) to test your knowledge on the topics learned in the section

          · LABS at the end of each section. The labs follow the official Microsoft training labs and they are designed so you can practice   yourself at your own pace when you aren't watching the videos. You will have step-by-step instructions available to complete each lab and instructions to prepare your lab environment and deploy the necesarry resources for the labs.

          · Interactive pre-recorded demonstrations on some of the topics that cannot be covered in the lab environment

          · Links to official Microsoft resources/blogs/videos for further documentation available for each lesson on each topic

    This course curriculum follows the Microsoft's SC-200 exam study areas:

                  · Mitigate threats using Microsoft 365 Defender (25-30%)

                  · Mitigate threats using Microsoft Defender for Cloud (25-30%)

                  · Mitigate threats using Microsoft Sentinel (40-45%)


    Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

    Who this course is for:

    • Security Operations Analysts or anyone aspiring to work in this role
    • Anyone working in IT with exposure to Security Operations
    • Any IT enthusiast who wants to learn about Microsoft Security technologies
    • Candidates for the SC-200 exam

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    IT New Courses
    IT New Courses
    Instructor's Courses
    Technology is rapidly becoming a way of life, a way of work, a way in which everyone moves forward faster.  Our courses were created on the basis that we could help people to become empowered by learning IT skills themselves, rather than having someone else tell them what to do.IT New Courses gives people the depth of knowledge they need to get IT certifications which have a high-demand for professional careers in the job market. Our goal is to always bring you the most up to date content needed to not only pass the exam, but gain the real world experience necessary to excel in your IT career.IT New Courses brings you comprehensive yet concise video courses straight from the experts in the following areas:- Cloud Computing and Environments- Server Administration- Networking- Cyber SecurityOur courses are created by professional instructors who are certified with the following:- Microsoft Technology Associate: Windows Operating System Fundamentals– Microsoft Technology Associate: Networking Fundamentals– Microsoft Technology Associate: Windows Server® Administration Fundamentals– Microsoft® Certified Solutions Associate: Windows 8 (MCSA)– Microsoft® Certified Solutions Associate: Windows Server 2012 R2 / 2016 (MCSA)– Server Virtualization with Windows Server Hyper-V and System Center (MCSA)– Microsoft® Certified Solutions Expert: Cloud Platform and Infrastructure (MCSE)– Comptia Security +– Microsoft Cyber Security Professional– Certified Ethical Hacker (CEH v10)– Micrsosoft Certified Azure Solutions Architect Expert
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 49
    • duration 12:47:14
    • English subtitles has
    • Release Date 2022/11/22