Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    SC-200 Microsoft Security Operations Analyst Course & SIMs

    Posted By: lucky_aut
    SC-200 Microsoft Security Operations Analyst Course & SIMs

    SC-200 Microsoft Security Operations Analyst Course & SIMs
    Published 11/2023
    Duration: 13h 48m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 7.8 GB
    Genre: eLearning | Language: English

    Get prepared for the SC-200 exam with instructor led labs and hands on simulations available 24/7

    What you'll learn
    Learn the concepts and perform hands on activities needed to pass the SC-200 exam
    Gain a tremendous amount of knowledge involving securing Microsoft 365 and Azure Services
    Get loads of hands on experience with Security Operations for Microsoft 365
    Utilize hands on simulations that can be access anytime, anywhere!
    Requirements
    Willingness to put in the time and practice the steps shown in the course
    Description
    We really hope you'll agree, this training is way more then the average course on Udemy!
    Have access to the following:
    Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
    Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
    Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
    Introduction
    Welcome to the course
    Understanding the Microsoft Environment
    Foundations of Active Directory Domains
    Foundations of RAS, DMZ, and Virtualization
    Foundations of the Microsoft Cloud Services
    DONT SKIP: The first thing to know about Microsoft cloud services
    DONT SKIP: Azure AD is now renamed to Entra ID
    Questions for John Christopher
    Order of concepts covered in the course
    Performing hands on activities
    DONT SKIP: Using Assignments in the course
    Creating a free Microsoft 365 Account
    Activating licenses for Defender for Endpoint and Vulnerabilities
    Getting your free Azure credit
    Mitigate threats to the Microsoft 365 environment by using Microsoft 365 Defender
    Microsoft Defender and Microsoft Purview admin centers
    Introduction to Microsoft 365 Defender
    Using polices to remediate threats with Email ,Teams, SharePoint & OneDrive
    Investigate, respond, and remediate threats with Defender for Office 365
    Understanding data loss prevention (DLP) in Microsoft 365 Defender
    Implement data loss prevention policies (DLP) to respond and alert
    Investigate & respond to alerts generated by data loss prevention (DLP) policies
    Understanding insider risk policies
    Generating an insider risk policy
    Investigate and respond to alerts generated by insider risk policies
    Discover and manage apps by using Microsoft Defender for Cloud Apps
    Identify, investigate, & remediate security risks by using Defender for Cloud Apps
    Mitigate endpoint threats by using Microsoft Defender for Endpoint
    Concepts of management with Microsoft Defender for Endpoint
    Setup a Windows 11 virtual machine endpoint
    Enrolling to Intune for attack surface reduction (ASR) support
    Onboarding to manage devices using Defender for Endpoint
    A note about extra features in your Defender for Endpoint
    Incidents, alert notifications, and advanced feature for endpoints
    Review and respond to endpoint vulnerabilities
    Recommend attack surface reduction (ASR) for devices
    Configure and manage device groups
    Identify devices at risk using the Microsoft Defender Vulnerability Management
    Manage endpoint threat indicators
    Identify unmanaged devices by using device discovery
    Mitigate identity threats
    Mitigate security risks related to events for Microsoft Entra ID
    Concepts of using Microsoft Entra Identity Protection
    Mitigate security risks related to Microsoft Entra Identity Protection events
    Mitigate risks related to Microsoft Entra Identity Protection inside Microsoft Defender
    Understanding Microsoft Defender for Identity
    Mitigate security risks related to Active Directory Domain Services (AD DS) using Microsoft Defender for Identity
    Manage extended detection and response (XDR) in Microsoft 365 Defender
    Concepts of the purpose of extended detection and response (XRD)
    Setup a simulation lab using Microsoft 365 Defender
    Run an attack against a device in the simulation lab
    Manage incidents & automated investigations in the Microsoft 365 Defender portal
    Run an attack simulation email campaign in Microsoft 365 Defender
    Manage actions and submissions in the Microsoft 365 Defender portal
    Identify threats by using Kusto Query Language (KQL)
    Identify and remediate security risks by using Microsoft Secure Score
    Analyze threat analytics in the Microsoft 365 Defender portal
    Configure and manage custom detections and alerts
    Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview
    Understanding unified audit log licensing and requirements
    Setting unified audit permissions and enabling support
    Perform threat hunting by using unified audit log
    Perform threat hunting by using Content Search
    Implement and maintain cloud security posture management
    Overview of Microsoft Defender for Cloud
    Assign and manage regulatory compliance policies, including MCSB
    Improve the Microsoft Defender for Cloud secure score by applying remediation's
    Configure plans and agents for Microsoft Defender for Servers
    Configure and manage Microsoft Defender for DevOps
    Configure & manage Microsoft Defender External Attack Surface Management (EASM)
    Configure environment settings in Microsoft Defender for Cloud
    Plan and configure Microsoft Defender for Cloud settings
    Configure Microsoft Defender for Cloud roles
    Assess and recommend cloud workload protection and enable plans
    Configure automated onboarding of Azure resources
    Connect compute resources by using Azure Arc
    Connect multi-cloud resources by using Environment settings
    Respond to alerts and incidents in Microsoft Defender for Cloud
    Set up email notifications
    Create and manage alert suppression rules
    Design and configure workflow automation in Microsoft Defender for Cloud
    Generate sample alerts and incidents in Microsoft Defender for Cloud
    Remediate alerts and incidents by using MS Defender for Cloud recommendations
    Manage security alerts and incidents
    Analyze Microsoft Defender for Cloud threat intelligence reports
    Design and configure a Microsoft Sentinel workspace
    Concepts of Microsoft Sentinel
    Plan a Microsoft Sentinel workspace
    Configure Microsoft Sentinel roles
    Design and configure Microsoft Sentinel data storage, log types and log retention
    Plan and implement the use of data connectors for ingestion of data sources in Microsoft Sentinel
    Identify data sources to be ingested for Microsoft Sentinel
    Configure and use MS Sentinel connectors, Azure Policy & diagnostic settings
    Configure Microsoft Sentinel connectors for MS 365 Defender & Defender for Cloud
    Design and configure Syslog and Common Event Format (CEF) event collections
    Design and configure Windows security event collections
    Configure threat intelligence connectors
    Create custom log tables in the workspace to store ingested data
    Manage Microsoft Sentinel analytics rules
    Concepts of Microsoft Sentinel analytics rules
    Configure the Fusion rule
    Configure Microsoft security analytics rules
    Configure built-in scheduled query rules
    Configure custom scheduled query rules
    Configure near-real-time (NRT) analytics rules
    Manage analytics rules from Content hub
    Manage and use watchlists
    Manage and use threat indicators
    Perform data classification and normalization
    Classify and analyze data by using entities
    Query Microsoft Sentinel data by using Advanced Security Information Model(ASIM)
    Develop and manage ASIM parsers
    Configure security orchestration automated response (SOAR) in Microsoft Sentinel
    Create and configure automation rules
    Create and configure Microsoft Sentinel playbooks
    Configure analytic rules to trigger automation rules
    Trigger playbooks from alerts and incidents
    Manage Microsoft Sentinel incidents
    Configure an incident generation
    Triage incidents in Microsoft Sentinel
    Investigate incidents in Microsoft Sentinel
    Respond to incidents in Microsoft Sentinel
    Investigate multi-workspace incidents
    Use Microsoft Sentinel workbooks to analyze and interpret data
    Activate and customize Microsoft Sentinel workbook templates
    Create custom workbooks
    Configure advanced visualizations
    Hunt for threats by using Microsoft Sentinel
    Analyze attack vector coverage by using MITRE ATT&CK in Microsoft Sentinel
    Customize content gallery hunting queries
    Create custom hunting queries
    Use hunting bookmarks for data investigations
    Monitor hunting queries by using Livestream
    Retrieve and manage archived log data
    Create and manage search jobs
    Manage threats by using User and Entity Behavior Analytics
    Configure User and Entity Behavior Analytics settings
    Investigate threats by using entity pages
    Configure anomaly detection analytics rules
    Conclusion
    Cleaning up your lab environment
    Getting a Udemy certificate
    BONUS Where do I go from here?
    Who this course is for:
    IT people interested in learning and passing the Microsoft SC-200 Exam
    People interested in learning a tremendous amount about Security Operations for Microsoft 365


    More Info