Price: 4.00 USD | Size: 3.76 GB | Duration : 11.32 + Hours |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links. You can Download This Course immediately from that Links.
Microsoft Security Operations Analyst (SC-200)
Modules
01. Getting to Know MS 365 Defender
02. Microsoft 365 Defender Portal Introduction
03. Microsoft 365 Defender Portal Endpoints
04. Microsoft 365 Defender Portal Email & Collaboration
05. Microsoft 365 Defender Portal Wrap-Up
06. MS 365 Defender Policies & Rules Built-In Rules
07. MS 365 Defender Policies & Rules Anti-Phishing
08. MS 365 Defender Policies & Rules Anti-SPAM
09. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links
10. MS 365 Defender Policies & Rules AllowBlock Lists
11. MS 365 Defender Policies & Rules Additional Rules
12. MS 365 Defender Policies & Rules Alert and Activity Policies
13. Protecting Office 365
14. Teams, Sharepoint and OneDrive Policies
15. Detect, Investigate, Respond and Remediate Threats
16. User Email Submissions
17. DLP Policies and Alerts
18. Sensitivity Labels
19. Insider Risk Policies
20. Into to MS Defender for Endpoint
21. Automated Investigation and Response (AIR)
22. Data Settings and Alert Notifications
23. Attack Surface Reduction Rules
24. Custom Detection Alerts
25. Responding to Incidents
26. Recommended Endpoint Configurations
27. Threat Analytics
28. MS Defender for Endpoint
29. Azure Identity Policies
30. Conditional Access Policies
31. Investigating Azure Identity Events
32. Using Secure Score
33. Tagging Sensitive Accounts
34. Investigating Defender for Identity Events
35. Microsoft Defender for Cloud Apps
36. Discovering Cloud Apps
37. Investigating Cloud App Activity
38. Cloud App Policies
39. Cross-Domain Investigations
40. Attack Simulation Training
41. Microsoft Defender for Cloud
42. Data Retention and Recommendations
43. Data Connectors
44. Connect AWS Cloud Resources
45. Connect GCP Cloud Resources
46. Cloud Alert Rules
47. Intro Managing Defender for Cloud
48. Automated Responses
49. Types of Alerts
50. Managing Alerts
51. Threat Intelligence
52. Key Vault Alerts
53. Data Privacy
54. SIEMs and SOARs
55. Microsoft Sentinel Workspaces
56. Setting Up Microsoft Sentinel
57. Microsoft Sentinel Roles
58. Microsoft Sentinel Data Storage
59. Data Sources and Prerequisites
60. Configuring Data Connectors Via Policies
61. Syslog and CEF Event Collectors
62. Threat Intelligence Connectors
63. Ingesting Custom Logs
64. Intro to Sentinel Analytics Rules
65. Design and Configure Analytics Rules
66. Activate Microsoft Security Analytics Rules
67. Custom Analytics Rules
68. Connector Provided Queries and Workflow
69. Incident Creation Logic with KQL
70. KQL Exercise
71. Creating Playbooks
72. Automation Rules
73. Defender Playbooks
74. Incidents Within Sentinel
75. Multi-Workspace Incidents
76. User and Entity Behavior Analytics (UEBA)
77. Sentinel Workbooks
78. Custom Workbooks
79. Security Operations Efficiency Workbook
80. Threat Hunting Queries
81. Hunting With Livestreams
82. Sentinel Bookmarks
83. Hunting With Notebooks
Microsoft Security Operations Analyst (SC-200)
You can Instant Download a PDF file
After successful payment,
This PDF File Contains Course Download links
You can Download This Course immediately from the click that Links