SC-200 Microsoft Security Operations Analyst
Pre-requisites
Course Overview
Learning Outcomes
By the end of this course, participants will be able to:
Table of Contents
Toggle- Use Microsoft Sentinel to detect, investigate, and respond to security incidents.
- Deploy and manage Microsoft Defender solutions to protect endpoints, identities, and collaboration tools.
- Conduct proactive threat hunting to identify and address emerging threats.
- Improve organizational security posture using Secure Score and compliance recommendations.
- Automate and streamline security operations for better efficiency and incident response.
Upcoming Classes
- Sunday
03:00 PM – 05:00 PM
- Thursday
03:00 PM – 05:00 PM | 07:00 AM – 09:00 AM
Benefits
Career Opportunities
Course Outline
- Overview of Microsoft Defender for Endpoint
- Understanding endpoint detection and response (EDR).
- Configuring and managing Defender for Endpoint.
- Analyzing threat data with Microsoft Defender.
- Using Microsoft Defender for Identity
- Detecting identity-based threats with Defender for Identity.
- Monitoring user behavior to detect anomalies.
- Investigating advanced identity threats.
- Protecting Office 365 with Microsoft Defender
- Configuring anti-phishing, anti-malware, and Safe Links policies.
- Investigating malicious emails and attachments.
- Managing alerts in Microsoft Defender for Office 365.
- Threat Analysis and Mitigation
- Responding to endpoint threats with automated actions.
- Performing threat analysis using threat intelligence.
- Introduction to Microsoft Sentinel
- Overview of Microsoft Sentinel’s role in SIEM and SOAR.
- Setting up Microsoft Sentinel for a cloud environment.
- Data Collection and Normalization
- Connecting Microsoft Sentinel to data sources.
- Managing connectors for logs and events.
- Normalizing data for effective analysis.
- Threat Detection with Sentinel
- Creating and managing analytics rules.
- Detecting suspicious activities using KQL (Kusto Query Language).
- Automating incident creation and notification workflows.
- Incident Investigation and Management
- Investigating incidents in Microsoft Sentinel.
- Using workbooks for visualizing incident data.
- Microsoft 365 Defender Overview
- Understanding threat protection across Microsoft 365 workloads.
- Setting up and configuring Microsoft 365 Defender.
- Managing Security Incidents in Microsoft 365 Defender
- Investigating and remediating email threats.
- Tracking advanced threats across endpoints, identities, and email.
- Correlation of Threat Signals
- Leveraging the Threat Explorer for incident correlation.
- Using Advanced Hunting to detect and remediate threats.
- Automating Responses with Microsoft Defender
- Configuring automated investigation and remediation.
- Managing response workflows for advanced threats.
- Introduction to Threat Hunting
- Understanding proactive vs. reactive security operations.
- Using threat intelligence to identify potential attacks.
- Advanced Threat Hunting Techniques
- Writing KQL queries for advanced threat detection.
- Building custom detection rules in Microsoft Sentinel.
- Investigating anomalies using Microsoft Defender’s hunting tools.
- Optimizing SOC Operations
- Designing effective workflows for Security Operations Centers (SOCs).
- Enhancing incident response with custom playbooks and automation.
- Advanced Security Tools Integration
- Integrating third-party tools with Microsoft Sentinel.
- Using APIs and connectors for customized solutions.
- Mock Tests and Scenario-Based Exercises
- Multiple-choice questions aligned with SC-200 certification objectives.
- Hands-on tasks to simulate real-world security incidents.
- Capstone Project
- Configuring and managing a full security setup using Microsoft Defender and Sentinel.
- Presenting an end-to-end security operations workflow.
Course Inquiry
Need to Train Your Team?
IT Security's Unique Offering
Career Guidance
Flexible mode of training
Life Time Support
FAQs
IT professionals involved in managing and supporting cloud environments or looking to transition to a career in cloud computing.
Basic knowledge of IT security and Microsoft services is sufficient; experience in incident response is helpful but not mandatory.
Yes, the course aligns with the exam objectives and includes practice tests to enhance readiness.
Yes, IT Security Nepal offers both in-person and virtual instructor-led training. Learn more about our training methods.
We provide guidance for a reattempt and resources to strengthen areas of improvement.
Our team assists with resume building, interview preparation, and job placement support in cloud-related roles.