SC-200 Microsoft Security Operations Analyst Course SIMs
- IT & Software
- Nov 30, 2024

SC-200 Microsoft Security Operations Analyst Course & SIMs, available at $19.99, has an average rating of 4.58, with 112 lectures, based on 726 reviews, and has 5254 subscribers.
You will learn about Learn the concepts and perform hands on activities needed to pass the SC-200 exam Gain a tremendous amount of knowledge involving securing Microsoft 365 and Azure Services Get loads of hands on experience with Security Operations for Microsoft 365 Utilize hands on simulations that can be access anytime, anywhere! This course is ideal for individuals who are IT people interested in learning and passing the Microsoft SC-200 Exam or People interested in learning a tremendous amount about Security Operations for Microsoft 365 It is particularly useful for IT people interested in learning and passing the Microsoft SC-200 Exam or People interested in learning a tremendous amount about Security Operations for Microsoft 365.
Enroll now: SC-200 Microsoft Security Operations Analyst Course & SIMs
Summary
Title: SC-200 Microsoft Security Operations Analyst Course & SIMs
Price: $19.99
Average Rating: 4.58
Number of Lectures: 112
Number of Published Lectures: 109
Number of Curriculum Items: 124
Number of Published Curriculum Objects: 121
Original Price: $69.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
We really hope you’ll agree, this training is way more then the average course on Udemy!
Have access to the following:
Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer
Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material
Instructor led hands on and simulations to practice that can be followed even if you have little to no experience
TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:
Introduction
Welcome to the course
Understanding the Microsoft Environment
Foundations of Active Directory Domains
Foundations of RAS, DMZ, and Virtualization
Foundations of the Microsoft Cloud Services
DONT SKIP: The first thing to know about Microsoft cloud services
DONT SKIP: Azure AD is now renamed to Entra ID
Questions for John Christopher
Order of concepts covered in the course
Performing hands on activities
DONT SKIP: Using Assignments in the course
Creating a free Microsoft 365 Account
Activating licenses for Defender for Endpoint and Vulnerabilities
Getting your free Azure credit
Configure settings in Microsoft Defender XDR
Introduction to Microsoft 365 Defender
Concepts of the purpose of extended detection and response (XDR)
Microsoft Defender and Microsoft Purview admin centers
Concepts of Microsoft Sentinel
Concepts of management with Microsoft Defender for Endpoint
Manage assets and environments
Setup a Windows 11 virtual machine endpoint
Enrolling to Intune for attack surface reduction (ASR) support
Onboarding to manage devices using Defender for Endpoint
A note about extra features in your Defender for Endpoint
Incidents, alert notifications, and advanced feature for endpoints
Review and respond to endpoint vulnerabilities
Recommend attack surface reduction (ASR) for devices
Configure and manage device groups
Overview of Microsoft Defender for Cloud
Identify devices at risk using the Microsoft Defender Vulnerability Management
Manage endpoint threat indicators
Identify unmanaged devices by using device discovery
Design and configure a Microsoft Sentinel workspace
Plan a Microsoft Sentinel workspace
Configure Microsoft Sentinel roles
Design and configure Microsoft Sentinel data storage, log types and log retention
Ingest data sources in Microsoft Sentinel
Identify data sources to be ingested for Microsoft Sentinel
Configure and use MS Sentinel connectors, Azure Policy & diagnostic settings
Configure Microsoft Sentinel connectors for MS 365 Defender & Defender for Cloud
Design and configure Syslog and Common Event Format (CEF) event collections
Design and configure Windows security event collections
Configure threat intelligence connectors
Create custom log tables in the workspace to store ingested data
Configure protections in Microsoft Defender security technologies
Plan and configure Microsoft Defender for Cloud settings
Configure Microsoft Defender for Cloud roles
Assess and recommend cloud workload protection and enable plans
Configure automated onboarding of Azure resources
Connect multi-cloud resources by using Environment settings
Configure detection in Microsoft Defender XDR
Setup a simulation lab using Microsoft 365 Defender
Run an attack against a device in the simulation lab
Manage incidents & automated investigations in the Microsoft 365 Defender portal
Run an attack simulation email campaign in Microsoft 365 Defender
Manage actions and submissions in the Microsoft 365 Defender portal
Identify threats by using Kusto Query Language (KQL)
Identify and remediate security risks by using Microsoft Secure Score
Analyze threat analytics in the Microsoft 365 Defender portal
Configure and manage custom detections and alerts
Configure detections in Microsoft Sentinel
Concepts of Microsoft Sentinel analytics rules
Configure the Fusion rule
Configure Microsoft security analytics rules
Configure built-in scheduled query rules
Configure custom scheduled query rules
Configure near-real-time (NRT) analytics rules
Manage analytics rules from Content hub
Manage and use watchlists
Manage and use threat indicators
Respond to alerts and incidents in Microsoft Defender XDR
Using polices to remediate threats with Email, Teams, SharePoint & OneDrive
Investigate, respond, and remediate threats with Defender for Office 365
Understanding data loss prevention (DLP) in Microsoft 365 Defender
Implement data loss prevention policies (DLP) to respond and alert
Investigate & respond to alerts generated by data loss prevention (DLP) policies
Understanding insider risk policies
Generating an insider risk policy
Investigate and respond to alerts generated by insider risk policies
Discover and manage apps by using Microsoft Defender for Cloud Apps
Identify, investigate, & remediate security risks by using Defender for Cloud Apps
Respond to alerts and incidents identified by Microsoft Defender for Endpoint
Configure User and Entity Behavior Analytics settings
Investigate threats by using entity pages
Configure anomaly detection analytics rules
Enrich investigations by using other Microsoft tools
Understanding unified audit log licensing and requirements
Setting unified audit permissions and enabling support
Perform threat hunting by using unified audit log
Perform threat hunting by using Content Search
Manage incidents in Microsoft Sentinel
Configure an incident generation
Triage incidents in Microsoft Sentinel
Investigate incidents in Microsoft Sentinel
Respond to incidents in Microsoft Sentinel
Investigate multi-workspace incidents
Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel
Create and configure automation rules
Create and configure Microsoft Sentinel playbooks
Configure analytic rules to trigger automation rules
Trigger playbooks from alerts and incidents
Hunt for threats by using KQL
Identify threats by using Kusto Query Language (KQL)
Interpret threat analytics in the Microsoft Defender portal
Create custom hunting queries by using KQL
Hunt for threats by using Microsoft Sentinel
Analyze attack vector coverage by using MITRE ATT&CK in Microsoft Sentinel
Customize content gallery hunting queries
Create custom hunting queries
Use hunting bookmarks for data investigations
Monitor hunting queries by using Livestream
Retrieve and manage archived log data
Create and manage search jobs
Respond to alerts and incidents in Microsoft Defender for Cloud
Set up email notifications
Create and manage alert suppression rules
Design and configure workflow automation in Microsoft Defender for Cloud
Generate sample alerts and incidents in Microsoft Defender for Cloud
Remediate alerts and incidents by using MS Defender for Cloud recommendations
Manage security alerts and incidents
Analyze Microsoft Defender for Cloud threat intelligence reports
Analyze and interpret data by using workbooks
Activate and customize Microsoft Sentinel workbook templates
Create custom workbooks
Configure advanced visualizations
Conclusion
Cleaning up your lab environment
Getting a Udemy certificate
BONUS Where do I go from here?
Course Curriculum
Chapter 1: Introduction
Lecture 1: Welcome to the course!
Lecture 2: Understanding the Microsoft Environment
Lecture 3: Foundations of Active Directory Domains
Lecture 4: Foundations of RAS, DMZ, and Virtualization
Lecture 5: Foundations of the Microsoft Cloud Services
Lecture 6: Udemy for B Students
Lecture 7: DONT SKIP: The first thing to know about Microsoft cloud services
Lecture 8: DONT SKIP: Azure AD is now renamed to Entra ID
Lecture 9: Questions for John Christopher
Lecture 10: Order of concepts covered in the course
Lecture 11: Certificate of Completion
Chapter 2: Performing hands on activities
Lecture 1: DONT SKIP: Using Assignments in the course
Lecture 2: DONT SKIP: Before beginning your account setup
Lecture 3: Creating a free Microsoft 365 Account
Lecture 4: Getting your free Azure credit
Chapter 3: Configure settings in Microsoft Defender XDR
Lecture 1: Introduction to Microsoft 365 Defender XDR
Lecture 2: Concepts of the purpose of extended detection and response (XDR)
Lecture 3: Microsoft Defender and Microsoft Purview admin centers
Lecture 4: Concepts of Microsoft Sentinel
Lecture 5: Configure a connection from Defender XDR to a Sentinel workspace
Lecture 6: Concepts of management with Microsoft Defender for Endpoint
Lecture 7: Setup a Windows 11 virtual machine endpoint
Lecture 8: Enrolling to Intune for attack surface reduction (ASR) support
Lecture 9: Onboarding to manage devices using Defender for Endpoint
Lecture 10: A note about extra features in your Defender for Endpoint
Lecture 11: Incidents, alert notifications rules and advanced feature for endpoints
Lecture 12: Review and respond to endpoint vulnerabilities
Lecture 13: Recommend attack surface reduction (ASR) for devices
Chapter 4: Manage assets and environments
Lecture 1: Configure and manage device groups
Lecture 2: Identify devices at risk using the Microsoft Defender Vulnerability Management
Lecture 3: Overview of Microsoft Defender for Cloud
Lecture 4: Manage resources by using Azure Arc
Lecture 5: Connect environments to Microsoft Defender for Cloud (by using multi-cloud)
Lecture 6: Manage endpoint threat indicators
Lecture 7: Identify unmanaged devices by using device discovery
Chapter 5: Design and configure a Microsoft Sentinel workspace
Lecture 1: Plan a Microsoft Sentinel workspace
Lecture 2: Configure Microsoft Sentinel roles & specify Azure RBAC roles for Sentinel
Lecture 3: Design and configure Microsoft Sentinel data storage,log types and log retention
Chapter 6: Ingest data sources in Microsoft Sentinel
Lecture 1: Identify data sources to be ingested for Microsoft Sentinel
Lecture 2: Configure and use MS Sentinel connectors, Azure Policy & diagnostic settings
Lecture 3: Configure Microsoft Sentinel connectors for MS 365 Defender & Defender for Cloud
Lecture 4: Design and configure Syslog and Common Event Format (CEF) event collections
Lecture 5: Design and configure Windows security event collections
Lecture 6: Configure threat intelligence connectors
Lecture 7: Create custom log tables in the workspace to store ingested data
Chapter 7: Configure protections in Microsoft Defender security technologies
Lecture 1: Plan and configure Microsoft Defender for Cloud settings
Lecture 2: Configure Microsoft Defender for Cloud roles
Lecture 3: Assess and recommend cloud workload protection and enable plans
Lecture 4: Configure automated onboarding of Azure resources
Chapter 8: Configure detection in Microsoft Defender XDR
Lecture 1: WARNING: Defender for Endpoint Lab now deprecated
Lecture 2: Setup a simulation lab using Microsoft 365 Defender
Lecture 3: Run an attack against a device in the simulation lab
Lecture 4: Manage incidents & automated investigations in the Microsoft 365 Defender portal
Lecture 5: Run an attack simulation email campaign in Microsoft 365 Defender
Lecture 6: Manage actions and submissions in the Microsoft 365 Defender portal
Lecture 7: Identify and remediate security risks by using Microsoft Secure Score
Lecture 8: Analyze threat analytics in the Microsoft 365 Defender portal
Lecture 9: Configure and manage custom detections and alerts
Chapter 9: Configure detections in Microsoft Sentinel
Lecture 1: Concepts of Microsoft Sentinel analytics rules
Lecture 2: Configure the Fusion rule
Lecture 3: Configure Microsoft security analytics rules
Lecture 4: Configure built-in scheduled query rules
Lecture 5: Configure custom scheduled query rules
Lecture 6: Configure near-real-time (NRT) analytics rules
Lecture 7: Manage analytics rules from Content hub
Lecture 8: Manage and use watchlists
Lecture 9: Manage and use threat indicators
Chapter 10: Respond to alerts and incidents in Microsoft Defender XDR
Lecture 1: Using polices to remediate threats with Email ,Teams, SharePoint & OneDrive
Lecture 2: Investigate, respond, and remediate threats with Defender for Office 365
Lecture 3: Understanding data loss prevention (DLP) in Microsoft 365 Defender
Lecture 4: Implement data loss prevention policies (DLP) to respond and alert
Lecture 5: Investigate & respond to alerts generated by data loss prevention (DLP) policies
Lecture 6: Understanding insider risk policies
Lecture 7: Generating an insider risk policy
Lecture 8: Investigate and respond to alerts generated by insider risk policies
Lecture 9: Discover and manage apps by using Microsoft Defender for Cloud Apps
Lecture 10: Identify,investigate, & remediate security risks by using Defender for Cloud App
Chapter 11: Respond to alerts and incidents identified by Microsoft Defender for Endpoint
Lecture 1: Configure User and Entity Behavior Analytics settings
Lecture 2: Investigate threats by using entity pages
Lecture 3: Configure anomaly detection analytics rules
Chapter 12: Enrich investigations by using other Microsoft tools
Instructors

John Christopher
IT Engineer and Trainer for 25 Years in the industry
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Top 10 Virtual Reality Courses to Learn in November 2024
- Price Action Trading (Forex and Index)
- Nagios - Ultimate IT monitoring guide with EyesOfNetwork
- Essential C Programming for Beginners- The Complete Guide
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Personal Finance
- Company Valuation Financial Modeling
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2ZB Trading Cryptocurrency Price Action Course
- 3Python for Absolute Beginners
- 4NGRX angular nativescript
- 5AS1 Tosca Practice for Interviews and new learners
- 6Marketing Mix Modeling in one day for your Brand Analytics_1
- 7Top 10 Machine Learning Courses to Learn in November 2024
- 8Top 10 3d Modeling Courses to Learn in November 2024
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling