Free download скачать SC-200 Microsoft Security Operations Analyst Course & SIMs
Published 11/2023
Created by John Christopher
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 124 Lectures ( 13h 47m ) | Size: 7.8 GB
Get prepared for the SC-200 exam with instructor led labs and hands on simulations available 24/7
What you'll learn
Learn the concepts and perform hands on activities needed to pass the SC-200 exam
Gain a tremendous amount of knowledge involving securing Microsoft 365 and Azure Services
Get loads of hands on experience with Security Operations for Microsoft 365
Utilize hands on simulations that can be access anytime, anywhere!
Requirements
Willingness to put in the time and practice the steps shown in the course
Description
We really hope you'll agree, this training is way more then the average course on Udemy! Have access to the following:Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified TrainerLecture that explains the concepts in an easy to learn method for someone that is just starting out with this materialInstructor led hands on and simulations to practice that can be followed even if you have little to no experienceTOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:IntroductionWelcome to the courseUnderstanding the Microsoft EnvironmentFoundations of Active Directory DomainsFoundations of RAS, DMZ, and VirtualizationFoundations of the Microsoft Cloud ServicesDONT SKIP: The first thing to know about Microsoft cloud servicesDONT SKIP: Azure AD is now renamed to Entra IDQuestions for John ChristopherOrder of concepts covered in the coursePerforming hands on activitiesDONT SKIP: Using Assignments in the courseCreating a free Microsoft 365 AccountActivating licenses for Defender for Endpoint and VulnerabilitiesGetting your free Azure creditMitigate threats to the Microsoft 365 environment by using Microsoft 365 DefenderMicrosoft Defender and Microsoft Purview admin centersIntroduction to Microsoft 365 DefenderUsing polices to remediate threats with Email ,Teams, SharePoint & OneDriveInvestigate, respond, and remediate threats with Defender for Office 365Understanding data loss prevention (DLP) in Microsoft 365 DefenderImplement data loss prevention policies (DLP) to respond and alertInvestigate & respond to alerts generated by data loss prevention (DLP) policiesUnderstanding insider risk policiesGenerating an insider risk policyInvestigate and respond to alerts generated by insider risk policiesDiscover and manage apps by using Microsoft Defender for Cloud AppsIdentify, investigate, & remediate security risks by using Defender for Cloud AppsMitigate endpoint threats by using Microsoft Defender for EndpointConcepts of management with Microsoft Defender for EndpointSetup a Windows 11 virtual machine endpointEnrolling to Intune for attack surface reduction (ASR) supportOnboarding to manage devices using Defender for EndpointA note about extra features in your Defender for EndpointIncidents, alert notifications, and advanced feature for endpointsReview and respond to endpoint vulnerabilitiesRecommend attack surface reduction (ASR) for devicesConfigure and manage device groupsIdentify devices at risk using the Microsoft Defender Vulnerability ManagementManage endpoint threat indicatorsIdentify unmanaged devices by using device discoveryMitigate identity threatsMitigate security risks related to events for Microsoft Entra IDConcepts of using Microsoft Entra Identity ProtectionMitigate security risks related to Microsoft Entra Identity Protection eventsMitigate risks related to Microsoft Entra Identity Protection inside Microsoft DefenderUnderstanding Microsoft Defender for IdentityMitigate security risks related to Active Directory Domain Services (AD DS) using Microsoft Defender for IdentityManage extended detection and response (XDR) in Microsoft 365 DefenderConcepts of the purpose of extended detection and response (XRD)Setup a simulation lab using Microsoft 365 DefenderRun an attack against a device in the simulation labManage incidents & automated investigations in the Microsoft 365 Defender portalRun an attack simulation email campaign in Microsoft 365 DefenderManage actions and submissions in the Microsoft 365 Defender portalIdentify threats by using Kusto Query Language (KQL)Identify and remediate security risks by using Microsoft Secure ScoreAnalyze threat analytics in the Microsoft 365 Defender portalConfigure and manage custom detections and alertsInvestigate threats by using audit features in Microsoft 365 Defender and Microsoft PurviewUnderstanding unified audit log licensing and requirementsSetting unified audit permissions and enabling supportPerform threat hunting by using unified audit logPerform threat hunting by using Content SearchImplement and maintain cloud security posture managementOverview of Microsoft Defender for CloudAssign and manage regulatory compliance policies, including MCSBImprove the Microsoft Defender for Cloud secure score by applying remediation'sConfigure plans and agents for Microsoft Defender for ServersConfigure and manage Microsoft Defender for DevOpsConfigure & manage Microsoft Defender External Attack Surface Management (EASM)Configure environment settings in Microsoft Defender for CloudPlan and configure Microsoft Defender for Cloud settingsConfigure Microsoft Defender for Cloud rolesAssess and recommend cloud workload protection and enable plansConfigure automated onboarding of Azure resourcesConnect compute resources by using Azure ArcConnect multi-cloud resources by using Environment settingsRespond to alerts and incidents in Microsoft Defender for CloudSet up email notificationsCreate and manage alert suppression rulesDesign and configure workflow automation in Microsoft Defender for CloudGenerate sample alerts and incidents in Microsoft Defender for CloudRemediate alerts and incidents by using MS Defender for Cloud recommendationsManage security alerts and incidentsAnalyze Microsoft Defender for Cloud threat intelligence reportsDesign and configure a Microsoft Sentinel workspaceConcepts of Microsoft SentinelPlan a Microsoft Sentinel workspaceConfigure Microsoft Sentinel rolesDesign and configure Microsoft Sentinel data storage, log types and log retentionPlan and implement the use of data connectors for ingestion of data sources in Microsoft SentinelIdentify data sources to be ingested for Microsoft SentinelConfigure and use MS Sentinel connectors, Azure Policy & diagnostic settingsConfigure Microsoft Sentinel connectors for MS 365 Defender & Defender for CloudDesign and configure Syslog and Common Event Format (CEF) event collectionsDesign and configure Windows security event collectionsConfigure threat intelligence connectorsCreate custom log tables in the workspace to store ingested dataManage Microsoft Sentinel analytics rulesConcepts of Microsoft Sentinel analytics rulesConfigure the Fusion ruleConfigure Microsoft security analytics rulesConfigure built-in scheduled query rulesConfigure custom scheduled query rulesConfigure near-real-time (NRT) analytics rulesManage analytics rules from Content hubManage and use watchlistsManage and use threat indicatorsPerform data classification and normalizationClassify and analyze data by using entitiesQuery Microsoft Sentinel data by using Advanced Security Information Model(ASIM)Develop and manage ASIM parsersConfigure security orchestration automated response (SOAR) in Microsoft SentinelCreate and configure automation rulesCreate and configure Microsoft Sentinel playbooksConfigure analytic rules to trigger automation rulesTrigger playbooks from alerts and incidentsManage Microsoft Sentinel incidentsConfigure an incident generationTriage incidents in Microsoft SentinelInvestigate incidents in Microsoft SentinelRespond to incidents in Microsoft SentinelInvestigate multi-workspace incidentsUse Microsoft Sentinel workbooks to analyze and interpret dataActivate and customize Microsoft Sentinel workbook templatesCreate custom workbooksConfigure advanced visualizationsHunt for threats by using Microsoft SentinelAnalyze attack vector coverage by using MITRE ATT&CK in Microsoft SentinelCustomize content gallery hunting queriesCreate custom hunting queriesUse hunting bookmarks for data investigationsMonitor hunting queries by using LivestreamRetrieve and manage archived log dataCreate and manage search jobsManage threats by using User and Entity Behavior AnalyticsConfigure User and Entity Behavior Analytics settingsInvestigate threats by using entity pagesConfigure anomaly detection analytics rulesConclusionCleaning up your lab environmentGetting a Udemy certificateBONUS Where do I go from here?
Who this course is for
IT people interested in learning and passing the Microsoft SC-200 Exam
People interested in learning a tremendous amount about Security Operations for Microsoft 365
Homepage
https://www.udemy.com/course/microsoft-security-operations-analyst-course-sims/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
Rapidgator
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part09.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part01.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part05.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part08.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part07.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part04.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part06.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part02.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part03.rar.html
Uploadgig
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part06.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part07.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part01.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part04.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part09.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part02.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part05.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part03.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part08.rar
NitroFlare
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part08.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part04.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part07.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part09.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part03.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part01.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part02.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part05.rar
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part06.rar
Fikper
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part03.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part08.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part01.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part09.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part05.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part06.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part02.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part04.rar.html
dngwz.SC200.Microsoft.Security.Operations.Analyst.Course..SIMs.part07.rar.html
No Password - Links are Interchangeable