Online training - Call us on 1300 009 924
Online training - access your course anytime, anywhere! Call us on 1300 009 924
Tech Academy

Microsoft Security Operations Analyst Course

Next Intake
4 Day Virtual Classroom
100% online
50+ Topics
Enrol anytime
Purchase online now
Vendor Aligned Technical Training
In partnership with

Course Overview

Learn threat detection, incident response, and mitigation strategies using cutting-edge Microsoft tools like Sentinel, Defender for Cloud, and 365 Defender. Gain comprehensive skills to safeguard data, networks, and applications as a proficient Security Operations Analyst.

Explore cybersecurity operations with SC-200! Discover Microsoft's Security Operations Analyst course covering threat detection, incident response, and mitigation. Master tools like Microsoft Sentinel, Defender for Cloud, and 365 Defender. Acquire essential skills for securing IT environments. Advance your career with our comprehensive SC-200 course, following official Microsoft guidelines.

Why should you do this course? 

  • Gain proficiency in threat detection, incident response, and mitigation strategies.
  • Master Microsoft Sentinel, Defender for Cloud, and 365 Defender tools.
  • Acquire hands-on skills for securing diverse IT environments.
  • Elevate your career as a proficient Security Operations Analyst.

What will you learn? 

  • Techniques for effective threat detection using Microsoft Sentinel.
  • Incident response strategies utilising Defender for Cloud and 365 Defender.
  • Proficient use of tools for safeguarding identities, cloud services, and endpoints.
  • Collaborative security practices and stakeholder engagement.

Who is this course for?

  • Security professionals aspiring to specialise in threat management and incident response.
  • IT professionals keen on mastering Microsoft's security tools for diverse IT environments.
  • Security Operations Analysts in charge of securing organisational assets.
  • Individuals aiming to validate their expertise in cybersecurity operations with Microsoft certification.

What you need to know

Explore the extensive SC-200 syllabus, encompassing vital cybersecurity areas like threat detection, incident response, and mitigation strategies. Immerse yourself in practical modules focusing on mastering Microsoft Sentinel, Defender for Cloud, and 365 Defender tools. Gain hands-on expertise crucial for securing diverse IT environments effectively.

What's Next?

Upon completing all of the topics successfully, you would be suited to take up the official Exam SC-200: Microsoft Security Operations Analyst

Skills Measured

  • Mitigate threats by using Microsoft 365 Defender
  • Mitigate threats by using Defender for Cloud
  • Mitigate threats by using Microsoft Sentinel

Course Structure

This course will provide in-depth coverage of the following topics:

  • Introduction to Microsoft 365 threat protection

  • Mitigate incidents using Microsoft 365 Defender

  • Protect your identities with Microsoft Entra ID Protection

  • Remediate risks with Microsoft Defender for Office 365

  • Safeguard your environment with Microsoft Defender for Identity

  • Secure your cloud apps and services with Microsoft Defender for Cloud Apps

  • Respond to data loss prevention alerts using Microsoft 365

  • Manage insider risk in Microsoft Purview

  • Investigate threats by using audit features in Microsoft 365 Defender and Microsof Purview Standard

  • Investigate threats using audit in Microsoft 365 Defender and Microsoft Purview (Premium)

  • Investigate threats with Content search in Microsoft Purview

  • Protect against threats with Microsoft Defender for Endpoint

  • Deploy the Microsoft Defender for Endpoint environment

  • Implement Windows security enhancements with Microsoft Defender for Endpoint

  • Perform device investigations in Microsoft Defender for Endpoint

  • Perform actions on a device using Microsoft Defender for Endpoint

  • Perform evidence and entities investigations using Microsoft Defender for Endpoint

  • Configure and manage automation using Microsoft Defender for Endpoint

  • Configure for alerts and detections in Microsoft Defender for Endpoint

  • Utilise Vulnerability Management in Microsoft Defender for Endpoint

  • Plan for cloud workload protections using Microsoft Defender for Cloud

  • Connect Azure assets to Microsoft Defender for Cloud

  • Connect non-Azure resources to Microsoft Defender for Cloud

  • Manage your cloud security posture management

  • Explain cloud workload protections in Microsoft Defender for Cloud

  • Remediate security alerts using Microsoft Defender for Cloud

  • Construct KQL statements for Microsoft Sentinel

  • Analyse query results using KQL

  • Build multi-table statements using KQL

  • Work with data in Microsoft Sentinel using Kusto Query Language

  • Introduction to Microsoft Sentinel

  • Create and manage Microsoft Sentinel workspaces

  • Query logs in Microsoft Sentinel

  • Use watchlists in Microsoft Sentinel

  • Utilise threat intelligence in Microsoft Sentinel

  • Connect data to Microsoft Sentinel using data connectors

  • Connect Microsoft services to Microsoft Sentinel

  • Connect Microsoft 365 Defender to Microsoft Sentinel

  • Connect Windows hosts to Microsoft Sentinel

  • Connect Common Event Format logs to Microsoft Sentinel

  • Connect syslog data sources to Microsoft Sentinel

  • Connect threat indicators to Microsoft Sentinel

  • Threat detection with Microsoft Sentinel analytics

  • Automation in Microsoft Sentinel

  • Security incident management in Microsoft Sentinel

  • Identify threats with Behavioral Analytics

  • Data normalisation in Microsoft Sentinel

  • Query, visualise, and monitor data in Microsoft Sentinel

  • Manage content in Microsoft Sentinel

  • Explain threat hunting concepts in Microsoft Sentinel

  • Threat hunting with Microsoft Sentinel

  • Use Search jobs in Microsoft Sentinel

  • Hunt for threats using notebooks in Microsoft Sentinel


Entry requirements

It is recommended that as a candidate, you have familiarity with:

  • Foundational knowledge in Microsoft 365.
  • Fundamental understanding of Microsoft security, compliance, and identity solutions.
  • Intermediate proficiency in Windows 10.
  • Familiarity with Azure services including Azure SQL Database and Azure Storage.
  • Knowledge of Azure virtual machines, virtual networking, and scripting concepts at a basic level.

Pricing Options

Standard Pricing (per person)
You pay $3300
Custom group pricing is available for organisations and teams.

Get in touch to know more!

FAQs

The SC-200 course concentrates on threat detection, incident response, and mitigation strategies using Microsoft Sentinel, Defender for Cloud, and 365 Defender. It emphasises mastering tools for securing diverse IT environments effectively.

The SC-200 course targets security professionals aspiring to specialise in threat management and incident response. It's suitable for IT professionals aiming to master Microsoft's security tools across various IT environments, specifically Security Operations Analysts securing organisational assets.

Candidates are advised to have a foundational understanding of Microsoft 365, basic knowledge of Microsoft security, compliance, and identity products, intermediate proficiency in Windows 10, familiarity with Azure services (including Azure SQL Database, Azure Storage, virtual machines, and virtual networking), along with a basic understanding of scripting concepts