Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Sc-200 Microsoft Security Operations Analyst Course & Sims

    Posted By: Sigha
    Sc-200 Microsoft Security Operations Analyst Course & Sims

    Sc-200 Microsoft Security Operations Analyst Course & Sims
    Last updated 8/2024
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English (US) | Size: 4.38 GB | Duration: 11h 46m

    Get prepared for the SC-200 exam with instructor led labs and hands on simulations available 24/7

    What you'll learn
    Learn the concepts and perform hands on activities needed to pass the SC-200 exam
    Gain a tremendous amount of knowledge involving securing Microsoft 365 and Azure Services
    Get loads of hands on experience with Security Operations for Microsoft 365
    Utilize hands on simulations that can be access anytime, anywhere!

    Requirements
    Willingness to put in the time and practice the steps shown in the course

    Description
    We really hope you'll agree, this training is way more then the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentFoundations of Active Directory DomainsFoundations of RAS, DMZ, and VirtualizationFoundations of the Microsoft Cloud ServicesDONT SKIP: The first thing to know about Microsoft cloud servicesDONT SKIP: Azure AD is now renamed to Entra IDQuestions for John ChristopherOrder of concepts covered in the coursePerforming hands on activitiesDONT SKIP: Using Assignments in the courseCreating a free Microsoft 365 AccountActivating licenses for Defender for Endpoint and VulnerabilitiesGetting your free Azure creditConfigure settings in Microsoft Defender XDRIntroduction to Microsoft 365 DefenderConcepts of the purpose of extended detection and response (XDR)Microsoft Defender and Microsoft Purview admin centersConcepts of Microsoft SentinelConcepts of management with Microsoft Defender for EndpointManage assets and environmentsSetup a Windows 11 virtual machine endpointEnrolling to Intune for attack surface reduction (ASR) supportOnboarding to manage devices using Defender for EndpointA note about extra features in your Defender for EndpointIncidents, alert notifications, and advanced feature for endpointsReview and respond to endpoint vulnerabilitiesRecommend attack surface reduction (ASR) for devicesConfigure and manage device groupsOverview of Microsoft Defender for CloudIdentify devices at risk using the Microsoft Defender Vulnerability ManagementManage endpoint threat indicatorsIdentify unmanaged devices by using device discoveryDesign and configure a Microsoft Sentinel workspacePlan a Microsoft Sentinel workspaceConfigure Microsoft Sentinel rolesDesign and configure Microsoft Sentinel data storage, log types and log retentionIngest data sources in Microsoft SentinelIdentify data sources to be ingested for Microsoft SentinelConfigure and use MS Sentinel connectors, Azure Policy & diagnostic settingsConfigure Microsoft Sentinel connectors for MS 365 Defender & Defender for CloudDesign and configure Syslog and Common Event Format (CEF) event collectionsDesign and configure Windows security event collectionsConfigure threat intelligence connectorsCreate custom log tables in the workspace to store ingested dataConfigure protections in Microsoft Defender security technologiesPlan and configure Microsoft Defender for Cloud settingsConfigure Microsoft Defender for Cloud rolesAssess and recommend cloud workload protection and enable plansConfigure automated onboarding of Azure resourcesConnect multi-cloud resources by using Environment settingsConfigure detection in Microsoft Defender XDRSetup a simulation lab using Microsoft 365 DefenderRun an attack against a device in the simulation labManage incidents & automated investigations in the Microsoft 365 Defender portalRun an attack simulation email campaign in Microsoft 365 DefenderManage actions and submissions in the Microsoft 365 Defender portalIdentify threats by using Kusto Query Language (KQL)Identify and remediate security risks by using Microsoft Secure ScoreAnalyze threat analytics in the Microsoft 365 Defender portalConfigure and manage custom detections and alertsConfigure detections in Microsoft SentinelConcepts of Microsoft Sentinel analytics rulesConfigure the Fusion ruleConfigure Microsoft security analytics rulesConfigure built-in scheduled query rulesConfigure custom scheduled query rulesConfigure near-real-time (NRT) analytics rulesManage analytics rules from Content hubManage and use watchlistsManage and use threat indicatorsRespond to alerts and incidents in Microsoft Defender XDRUsing polices to remediate threats with Email, Teams, SharePoint & OneDriveInvestigate, respond, and remediate threats with Defender for Office 365Understanding data loss prevention (DLP) in Microsoft 365 DefenderImplement data loss prevention policies (DLP) to respond and alertInvestigate & respond to alerts generated by data loss prevention (DLP) policiesUnderstanding insider risk policiesGenerating an insider risk policyInvestigate and respond to alerts generated by insider risk policiesDiscover and manage apps by using Microsoft Defender for Cloud AppsIdentify, investigate, & remediate security risks by using Defender for Cloud AppsRespond to alerts and incidents identified by Microsoft Defender for EndpointConfigure User and Entity Behavior Analytics settingsInvestigate threats by using entity pagesConfigure anomaly detection analytics rulesEnrich investigations by using other Microsoft toolsUnderstanding unified audit log licensing and requirementsSetting unified audit permissions and enabling supportPerform threat hunting by using unified audit logPerform threat hunting by using Content SearchManage incidents in Microsoft SentinelConfigure an incident generationTriage incidents in Microsoft SentinelInvestigate incidents in Microsoft SentinelRespond to incidents in Microsoft SentinelInvestigate multi-workspace incidentsConfigure security orchestration, automation, and response (SOAR) in Microsoft SentinelCreate and configure automation rulesCreate and configure Microsoft Sentinel playbooksConfigure analytic rules to trigger automation rulesTrigger playbooks from alerts and incidentsHunt for threats by using KQLIdentify threats by using Kusto Query Language (KQL)Interpret threat analytics in the Microsoft Defender portalCreate custom hunting queries by using KQLHunt for threats by using Microsoft SentinelAnalyze attack vector coverage by using MITRE ATT&CK in Microsoft SentinelCustomize content gallery hunting queriesCreate custom hunting queriesUse hunting bookmarks for data investigationsMonitor hunting queries by using LivestreamRetrieve and manage archived log dataCreate and manage search jobsRespond to alerts and incidents in Microsoft Defender for CloudSet up email notificationsCreate and manage alert suppression rulesDesign and configure workflow automation in Microsoft Defender for CloudGenerate sample alerts and incidents in Microsoft Defender for CloudRemediate alerts and incidents by using MS Defender for Cloud recommendationsManage security alerts and incidentsAnalyze Microsoft Defender for Cloud threat intelligence reportsAnalyze and interpret data by using workbooksActivate and customize Microsoft Sentinel workbook templatesCreate custom workbooksConfigure advanced visualizationsConclusionCleaning up your lab environmentGetting a Udemy certificateBONUS Where do I go from here?

    Who this course is for:
    IT people interested in learning and passing the Microsoft SC-200 Exam,People interested in learning a tremendous amount about Security Operations for Microsoft 365


    Sc-200 Microsoft Security Operations Analyst Course & Sims


    For More Courses Visit & Bookmark Your Preferred Language Blog
    From Here: English - Français - Italiano - Deutsch - Español - Português - Polski - Türkçe - Русский