Free

SC-200 Microsoft Security Operations Analyst

Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.
8
20
M
Time
advanced
difficulty
8
ceu/cpe

Course Content

Module 8 Review Questions

11m

Understanding Threat Hunting and KQL Queries
Working with KQL Queries

7m

Understanding Threat Hunting and KQL Queries
Introduction to KQL Queries

11m

Understanding Threat Hunting and KQL Queries
Threat Hunting Concepts

10m

Understanding Threat Hunting and KQL Queries
Module 7 Review Questions

6m

Understanding Threat Detection with Microsoft Sentinel
Microsoft Sentinel Content Hub Demonstration

5m

Understanding Threat Detection with Microsoft Sentinel
Visualizing and Managing Data in Sentinel

10m

Understanding Threat Detection with Microsoft Sentinel
Introduction to Data Normalization

10m

Understanding Threat Detection with Microsoft Sentinel
How to Use Automation for Threat Detection

11m

Understanding Threat Detection with Microsoft Sentinel
Introduction to Microsoft Sentinel Analytics Tool

11m

Understanding Threat Detection with Microsoft Sentinel
Module 6 Review Questions

6m

Implementing Data Connectors in Microsoft Sentinel
Connecting Threat Intelligence Platforms Connector

9m

Implementing Data Connectors in Microsoft Sentinel
Connecting Event and Sys Logs

10m

Implementing Data Connectors in Microsoft Sentinel
Connecting Windows Host Machines

12m

Implementing Data Connectors in Microsoft Sentinel
Connecting Microsoft 365 Defender to Microsoft Sentinel

13m

Implementing Data Connectors in Microsoft Sentinel
Introduction to Different Types of Data Connectors

10m

Implementing Data Connectors in Microsoft Sentinel
Module 5 Review Questions

6m

Design and Configure Microsoft Sentinel
How to Utilize Threat Intelligence

8m

Design and Configure Microsoft Sentinel
Configuring Watchlist

5m

Design and Configure Microsoft Sentinel
Understanding Tables and Logs in Microsoft Sentinel

8m

Design and Configure Microsoft Sentinel
Configuring Microsoft Sentinel Workspace

9m

Design and Configure Microsoft Sentinel
Introduction to Microsoft Sentinel

8m

Design and Configure Microsoft Sentinel
Module 4 Review Questions

6m

Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Plan for Compliance Requirements

30m

Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Security Alerts in Microsoft Defender

13m

Implementing Cloud Workload Protection Using Microsoft Defender for Cloud
Course Description
This course is part of a Career Path:
Become a Cyber Security Engineer
In this career path, you will learn what it takes to become a Security Engineer, a role in the highest demand with 57,000+ job openings according to cyberseek.org. Learn to resolve production security issues, configure and manage firewalls and intrusion detection systems (IDS), investigate incidents, perform forensics and run incident responses. Cybrary offers practical, virtual lab environments specific to Cyber Security Engineering that will help you gain real-world, hands-on skills with the industry’s latest tools and technologies.
Become a SOC Analyst - Level 1
A Security Operations Center Analyst (SOC Analyst) stands as a front line of defense against the ever present cyber threats faced by organizations today. A SOC team ensures an organization’s digital assets remain secure and protected from unauthorized access by monitoring and responding to massive amounts of data in record time. In this role, you will protect your organization’s infrastructure by monitoring data to identify suspicious activity, then mitigating risks before a breach occurs. Cybrary's Become a SOC Analyst - Level 1 career path will equip you to break into the field with skills aligned to the US National Institute of Standards and Technology's Cyber Defense Analyst NICE work role.

Instructed by

Instructor
Seema Rahman

Seema's primary focus is Azure and Microsoft 365. She is a Microsoft Certified Trainer with experience in the delivery of Microsoft courses and workshops. Prior to Zodela Technologies, Seema spent 15+ years at Microsoft in various roles, such as senior escalation engineer, working with Microsoft Teams, Skype for Business, Office 365, and Microsoft Exchange.

She has a Master of Science in computer engineering from the University of Central Florida.

Provider
Cybrary Logo
Certification Body
Microsoft
Certificate of Completion

Complete this entire course to earn a SC-200 Microsoft Security Operations Analyst Certificate of Completion