top of page

Related Courses

Microsoft Security Operations Analyst (SC-200)

Price: 4.00 USD | Size: 3.76 GB | Duration : 11.32 +  Hours |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

 

HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links. You can Download This Course immediately from that Links.

 

 

Microsoft Security Operations Analyst (SC-200)

 

Modules

01. Getting to Know MS 365 Defender

02. Microsoft 365 Defender Portal Introduction

03. Microsoft 365 Defender Portal Endpoints

04. Microsoft 365 Defender Portal Email & Collaboration

05. Microsoft 365 Defender Portal Wrap-Up

06. MS 365 Defender Policies & Rules Built-In Rules

07. MS 365 Defender Policies & Rules Anti-Phishing

08. MS 365 Defender Policies & Rules Anti-SPAM

09. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links

10. MS 365 Defender Policies & Rules AllowBlock Lists

11. MS 365 Defender Policies & Rules Additional Rules

12. MS 365 Defender Policies & Rules Alert and Activity Policies

13. Protecting Office 365

14. Teams, Sharepoint and OneDrive Policies

15. Detect, Investigate, Respond and Remediate Threats

16. User Email Submissions

17. DLP Policies and Alerts

18. Sensitivity Labels

19. Insider Risk Policies

20. Into to MS Defender for Endpoint

21. Automated Investigation and Response (AIR)

22. Data Settings and Alert Notifications

23. Attack Surface Reduction Rules

24. Custom Detection Alerts

25. Responding to Incidents

26. Recommended Endpoint Configurations

27. Threat Analytics

28. MS Defender for Endpoint

29. Azure Identity Policies

30. Conditional Access Policies

31. Investigating Azure Identity Events

32. Using Secure Score

33. Tagging Sensitive Accounts

34. Investigating Defender for Identity Events

35. Microsoft Defender for Cloud Apps

36. Discovering Cloud Apps

37. Investigating Cloud App Activity

38. Cloud App Policies

39. Cross-Domain Investigations

40. Attack Simulation Training

41. Microsoft Defender for Cloud

42. Data Retention and Recommendations

43. Data Connectors

44. Connect AWS Cloud Resources

45. Connect GCP Cloud Resources

46. Cloud Alert Rules

47. Intro Managing Defender for Cloud

48. Automated Responses

49. Types of Alerts

50. Managing Alerts

51. Threat Intelligence

52. Key Vault Alerts

53. Data Privacy

54. SIEMs and SOARs

55. Microsoft Sentinel Workspaces

56. Setting Up Microsoft Sentinel

57. Microsoft Sentinel Roles

58. Microsoft Sentinel Data Storage

59. Data Sources and Prerequisites

60. Configuring Data Connectors Via Policies

61. Syslog and CEF Event Collectors

62. Threat Intelligence Connectors

63. Ingesting Custom Logs

64. Intro to Sentinel Analytics Rules

65. Design and Configure Analytics Rules

66. Activate Microsoft Security Analytics Rules

67. Custom Analytics Rules

68. Connector Provided Queries and Workflow

69. Incident Creation Logic with KQL

70. KQL Exercise

71. Creating Playbooks

72. Automation Rules

73. Defender Playbooks

74. Incidents Within Sentinel

75. Multi-Workspace Incidents

76. User and Entity Behavior Analytics (UEBA)

77. Sentinel Workbooks

78. Custom Workbooks

79. Security Operations Efficiency Workbook

80. Threat Hunting Queries

81. Hunting With Livestreams

82. Sentinel Bookmarks

83. Hunting With Notebooks

Microsoft Security Operations Analyst (SC-200)

SKU: EXTRS2022 76
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment, 

    This PDF File Contains Course Download links

    You can Download This Course immediately from the click that Links

bottom of page