SC-200: Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
The course is also designed to equip individuals with the necessary skills and knowledge to become proficient Azure Administrators. As an Azure Administrator, you will be responsible for overseeing several critical components of a cloud environment, including identity management, governance, storage, compute, and virtual networks.
The course is scheduled from Monday through Thursday on the following dates and time.
October 16-19, 2023 1:00pm to 4:00pm AEDT
The cost of the course is $700 including GST and the following:
Prerequisites
It would be ideal if you had acquired the skills and knowledge listed beforehand or had completed the Azure fundamentals training. However, if you haven’t, don’t worry. You can obtain those skills by accessing our online portal.
Key Learning Objectives
Agenda
- Mitigate threats using Microsoft 365 Defender
- Mitigate threats using Microsoft Defender for Endpoint
Session 1
- Mitigate threats using Microsoft Defender for Cloud
- Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Session 2
- Configure your Microsoft Sentinel environment
- Connect logs to Microsoft Sentinel
Session 3
- Create detections and perform investigations using Microsoft Sentinel
- Perform threat hunting in Microsoft Sentinel