Home Search Profile

Master SC-200: Microsoft Security Operations Analyst Pro 2024

Focused View

6:03:10

  • 01 Exam SC-200.mp4
    09:22
  • 02 Learning objectives.mp4
    01:02
  • 03 Configure a connection from Defender XDR to a Sentinel workspace.mp4
    05:11
  • 04 Configure alert and vulnerability notification rules.mp4
    04:32
  • 05 Configure Microsoft Defender for Endpoint advanced features.mp4
    07:14
  • 06 Configure endpoint rules settings, including indicators and web content filtering.mp4
    08:56
  • 07 Manage automated investigation and response capabilities in Microsoft Defender XDR.mp4
    06:05
  • 08 Configure automatic attack disruption in Microsoft Defender XDR.mp4
    06:25
  • 09 Learning objectives.mp4
    01:01
  • 10 Configure and manage device groups, permissions, and automation levels in Microsoft Defender for Endpoint.mp4
    07:07
  • 11 Identify and remediate unmanaged devices in Microsoft Defender for Endpoint.mp4
    04:22
  • 12 Manage resources using Azure Arc.mp4
    07:16
  • 13 Connect environments to Microsoft Defender for Cloud using multi-cloud account management.mp4
    06:53
  • 14 Discover and remediate unprotected resources using Defender for Cloud.mp4
    06:16
  • 15 Identify and remediate devices at risk using Microsoft Defender Vulnerability Management.mp4
    07:00
  • 16 Learning objectives.mp4
    00:53
  • 17 Plan a Microsoft Sentinel workspace.mp4
    03:55
  • 18 Configure Microsoft Sentinel roles.mp4
    03:09
  • 19 Specify Azure RBAC roles for Microsoft Sentinel configuration.mp4
    03:39
  • 20 Design and configure Microsoft Sentinel data storage, including log types and log retention.mp4
    07:49
  • 21 Manage multiple workspaces using Workspace Manager and Azure Lighthouse.mp4
    04:17
  • 22 Learning objectives.mp4
    01:30
  • 23 Identify data sources to be ingested for Microsoft Sentinel and implement content hub solutions.mp4
    05:16
  • 24 Configure and use Microsoft connectors for Azure resources, including Azure Policy and diagnostic settings.mp4
    03:34
  • 25 Configure bidirectional synchronization between Microsoft Sentinel and Microsoft Defender XDR.mp4
    04:51
  • 26 Configure bidirectional synchronization between Microsoft Sentinel and Microsoft Defender for Cloud.mp4
    02:54
  • 27 Plan and configure Syslog and Common Event Format (CEF) event collections.mp4
    06:29
  • 28 Plan and configure collection of Windows Security events using data collection rules, including Windows Event Forwarding (WEF).mp4
    04:33
  • 29 Configure threat intelligence connectors, including platform, TAXII, upload indicators API, and MISP.mp4
    06:45
  • 30 Create custom log tables in the workspace to store ingested data.mp4
    05:52
  • 31 Learning objectives.mp4
    00:47
  • 32 Configure policies for Microsoft Defender for Cloud apps.mp4
    08:30
  • 33 Configure policies for Microsoft Defender for Office.mp4
    06:30
  • 34 Configure security policies for Microsoft Defender for Endpoints, including attack surface reduction (ASR) rules.mp4
    06:40
  • 35 Configure cloud workload protections in Microsoft Defender for Cloud.mp4
    08:25
  • 36 Learning objectives.mp4
    00:34
  • 37 Configure and manage custom detections.mp4
    08:52
  • 38 Configure alert tuning.mp4
    06:14
  • 39 Configure deception rules in Microsoft Defender XDR.mp4
    10:04
  • 40 Learning objectives.mp4
    01:00
  • 41 Classify and analyze data using entities.mp4
    08:30
  • 42 Configure scheduled query rules, including KQL.mp4
    14:43
  • 43 Configure near-real-time (NRT) query rules, including KQL.mp4
    03:59
  • 44 Manage analytics rules from content hub.mp4
    04:05
  • 45 Configure anomaly detection analytics rules.mp4
    07:12
  • 46 Configure the fusion rule.mp4
    06:48
  • 47 Query Microsoft Sentinel data using ASIM parsers.mp4
    08:47
  • 48 Manage and use threat indicators.mp4
    08:02
  • 49 Learning objectives.mp4
    01:46
  • 50 Investigate and remediate threats to Microsoft Teams, SharePoint Online, and OneDrive.mp4
    05:34
  • 51 Investigate and remediate threats in email using Microsoft Defender for Office.mp4
    06:09
  • 52 Investigate and remediate ransomware and business email compromise incidents identified by automatic attack disruption.mp4
    04:39
  • 53 Investigate and remediate compromised entities identified by Microsoft Purview data loss prevention (DLP) policies.mp4
    05:01
  • 54 Investigate and remediate threats identified by Microsoft Purview insider risk policies.mp4
    10:01
  • 55 Investigate and remediate alerts and incidents identified by Microsoft Defender for Cloud.mp4
    07:59
  • 56 Investigate and remediate security risks identified by Microsoft Defender for Cloud apps.mp4
    05:03
  • 57 Investigate and remediate compromised identities in Microsoft Entra ID.mp4
    03:48
  • 58 Investigate and remediate security alerts from Microsoft Defender for Identity.mp4
    05:04
  • 59 Manage actions and submissions in the Microsoft Defender portal.mp4
    08:34
  • 60 Learning objectives.mp4
    00:45
  • 61 Investigate timeline of compromised devices.mp4
    06:43
  • 62 Perform actions on the device, including live response and collecting investigation packages.mp4
    10:33
  • 63 Perform evidence and entity investigation.mp4
    07:41
  • More details


    Course Overview

    This comprehensive course prepares you for the SC-200 certification, equipping you with essential skills to secure digital assets using Microsoft 365 Defender, Sentinel, and Defender for Cloud. Led by a Microsoft MVP, it covers security operations, threat detection, and incident response in hybrid environments.

    What You'll Learn

    • Configure and manage Microsoft Defender XDR and Sentinel workspaces
    • Implement threat detection and automated response solutions
    • Investigate and remediate security incidents across Microsoft 365

    Who This Is For

    • IT professionals securing cloud/hybrid environments
    • Aspiring Microsoft Security Operations Analysts
    • Security administrators managing Defender solutions

    Key Benefits

    • Hands-on preparation for SC-200 certification exam
    • Master Microsoft's enterprise security toolset
    • Learn from Microsoft Certified Trainer expertise

    Curriculum Highlights

    1. Microsoft Defender XDR configuration
    2. Sentinel workspace design & data ingestion
    3. Advanced threat investigation techniques
    Focused display
    Category
    • language english
    • Training sessions 63
    • duration 6:03:10
    • English subtitles has
    • Release Date 2025/06/02

    Courses related to Network Security