TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
Microsoft
SC-200: Microsoft Security Operations Analyst
Curriculum
12 Sections
34 Lessons
14 Hours
Expand all sections
Collapse all sections
01. Defender for Endpoint
4
1.1
Defender for Endpoint Monitoring
1.2
Defender for Endpoint Security
1.3
Exploring the Dashboard
1.4
Overview
02. M365 Defender
3
2.1
Email and Collaboration, Cloud Apps
2.2
Incidents and Alerts, Hunting, Vulnerability Management
2.3
Overview
03. Working with Defender for Cloud
1
3.1
Working with Defender for Cloud
04. Connecting and Onboarding Assets
5
4.1
GCP, Alerts
4.2
Viewing Security Recommendations
4.3
Adding Linux Machines
4.4
Adding a Non-Azure Server
4.5
Adding a Non-Azure Server
05. Alerts and Responses
4
5.1
Exploring Suppressions Rules
5.2
Creating a Suppression Rule
5.3
Adding a Workflow
5.4
Creating Logic Apps
06. Creating Queries Using Kusto Query Language
2
6.1
Examples
6.2
Overview
07. Basic Configuration
3
7.1
Permissions, Roles and Log Analytics
7.2
Data Connectors, Watchlists and Threat Intelligence
7.3
Sentinel Overview and Initial Setup
08. Logging and Importing
1
8.1
Logging and Importing Overview and Example
09. Alerts and Investigation
3
9.1
Alerts and Investigation Syslog
9.2
Exploring Alerts and Investigation
9.3
Alerts and Investigation Overview
10. Sentinel Analytics
2
10.1
Sentinel Analytics Rule Examples
10.2
Sentinel Analytics Overview
11. Working with Microsoft Sentinel
3
11.1
Security Incident Management
11.2
Threat Response Setup
11.3
Threat Response
12. Anomaly Detection and Hunting
3
12.1
Hunting Queries
12.2
Threat Hunting Rules
12.3
Anomaly Rules
This content is protected, please
login
and
enroll
in the course to view this content!