Free
SC-200 Microsoft Security Operations Analyst
Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.

8
H
20
M
Time
advanced
difficulty
8
ceu/cpe
Course Content
Module 8 Review Questions
Understanding Threat Hunting and KQL Queries
Working with KQL Queries
Understanding Threat Hunting and KQL Queries
Introduction to KQL Queries
Understanding Threat Hunting and KQL Queries
Threat Hunting Concepts
Understanding Threat Hunting and KQL Queries
Module 7 Review Questions
Understanding Threat Detection with Microsoft Sentinel
Microsoft Sentinel Content Hub Demonstration
Understanding Threat Detection with Microsoft Sentinel
Visualizing and Managing Data in Sentinel
Understanding Threat Detection with Microsoft Sentinel
Introduction to Data Normalization
Understanding Threat Detection with Microsoft Sentinel
How to Use Automation for Threat Detection
Understanding Threat Detection with Microsoft Sentinel
Introduction to Microsoft Sentinel Analytics Tool
Understanding Threat Detection with Microsoft Sentinel
Module 6 Review Questions
Implementing Data Connectors in Microsoft Sentinel
Connecting Threat Intelligence Platforms Connector
Implementing Data Connectors in Microsoft Sentinel
Connecting Event and Sys Logs
Implementing Data Connectors in Microsoft Sentinel
Connecting Windows Host Machines
Implementing Data Connectors in Microsoft Sentinel
Connecting Microsoft 365 Defender to Microsoft Sentinel
Implementing Data Connectors in Microsoft Sentinel
Introduction to Different Types of Data Connectors
Implementing Data Connectors in Microsoft Sentinel
Module 5 Review Questions
Design and Configure Microsoft Sentinel
How to Utilize Threat Intelligence
Design and Configure Microsoft Sentinel
Configuring Watchlist
Design and Configure Microsoft Sentinel
Understanding Tables and Logs in Microsoft Sentinel
Design and Configure Microsoft Sentinel
Configuring Microsoft Sentinel Workspace
Design and Configure Microsoft Sentinel
Introduction to Microsoft Sentinel
Design and Configure Microsoft Sentinel
Module 4 Review Questions
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Plan for Compliance Requirements
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Security Alerts in Microsoft Defender
Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Course Description