Microsoft On-Demand: Microsoft Security Operations Analyst (SC-200) Course Outline
Special Note to New Hampshire Residents
This course has not yet been approved by the New Hampshire Department of Education. Please contact us for an update on when the class will be available in New Hampshire.
Scheduled release date: Q4 2021
*** Note: This is a Microsoft On-Demand (self -study) course, 180-day 24/7 access via the internet ***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
About This Course
We have assembled a complete package of self-study materials that cover all of the topics that are included in Microsoft's official Instructor-led course. With these resources, you have a flexible platform that allows you to gain the knowledge you need for your job. If you also want certification, see the additional Exam Pak option--you can purchase for $250, a 50% discount.
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.
Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.
Basic understanding of Microsoft 365
Intermediate understanding of Windows 10
Fundamental understanding of Microsoft security, compliance, and identity products
Understanding of Microsoft Defender for Endpoint
Familiarity with Azure services, specifically Azure SQL Database and Azure Storage
Familiarity with Azure virtual machines and virtual networking
Foundational knowledge of computer networking
Basic understanding of scripting concepts
Your course includes:
Microsoft Official E-Learning
We will be your guide through the official Microsoft Learn content directing you through this training platform which provides interactive learning modules with reading, hands-on experiences, knowledge checks and short videos.
Additional Expert Videos
Our subject matter experts provide an additional path through the Microsoft course objectives. We've assembled hours of video instruction where you can follow-along and learn from our experts.
Auditing Instructor-Led Training
With ONLC's Microsoft On-Demand training, you can also "Audit" a full instructor-led class. This gives you another perspective on how the content is presented. As a companion to the ILT course, you will receive the Microsoft Official Curriculum. (You must contact our office to reserve a seat in an upcoming class.) Note: Auditors will be able to see and hear the instructor’s presentation, however the instructor will not be able to hear you and you will not have direct access to the live instructor or lab machines.
Interested in Getting Certification? Check out our Exam Pak option!
Prepare for you Microsoft Certification by purchasing our Exam Pak for $250--a savings of 50%.
Additional Exam Pak Option includes:
24/7 Online Support
Need assistance while you are learning? Chat with our 24/7 online support specialists. And, with your permission, the expert can even take over your computer to provide assistance. (90-day access.)
Microsoft Exam Reference Guide
When you are ready for certification, begin your preparation with the Exam Reference Guide from Microsoft Press. We provide you with a copy of this book that focuses on the critical skills and knowledge measured on the Microsoft Certification exam.
Practice Exam Software
You may study at your own pace with this web-based practice exam. Exam-like questions are designed to help you prepare for your certification exam by validating your knowledge and reinforcing key concepts.
Exam Voucher with Exam-Pass Guarantee
Prepare for your exam using the practice software. Once you have achieved an 85% or above score, contact us and we will provide you with an exam voucher. Didn't pass the first time? Not a problem--you will get a second voucher with our Exam-Pass Guarantee - For details, click on the link below:
Exam Pass Guarantee
**Please call our office to order the Exam Pak. Note: Exam Paks are available at the discounted $250 price only when they are purchased at the same time as your Microsoft On-Demand class.**
Do You Still Prefer a Live, Instructor-led Class?
Already know Microsoft On-Demand, self-study training is not right for you? We also offer this same course content in a live, instructor-led format. For details, click on the link below:
SC-200: Microsoft Security, Operations Analyst
Special Note Regarding This Outline
On-Demand content is presented from multiple sources. As a result, the content and/or sequencing may vary from each source.
Module 1: Mitigate threats using Microsoft Defender for Endpoint
Implement the Microsoft Defender for Endpoint platform to detect, investigate, and respond to advanced threats.
Protect against threats with Microsoft Defender for Endpoint
Deploy the Microsoft Defender for Endpoint environment
Implement Windows 10 security enhancements with Microsoft Defender for Endpoint
Manage alerts and incidents in Microsoft Defender for Endpoint
Perform device investigations in Microsoft Defender for Endpoint
Perform actions on a device using Microsoft Defender for Endpoint
Perform evidence and entities investigations using Microsoft Defender for Endpoint
Configure and manage automation using Microsoft Defender for Endpoint
Configure for alerts and detections in Microsoft Defender for Endpoint
Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint
Module 2: Mitigate threats using Microsoft 365 Defender
Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender.
Introduction to threat protection with Microsoft 365
Mitigate incidents using Microsoft 365 Defender
Protect your identities with Azure AD Identity Protection
Remediate risks with Microsoft Defender for Office 365
Safeguard your environment with Microsoft Defender for Identity
Secure your cloud apps and services with Microsoft Cloud App Security
Respond to data loss prevention alerts using Microsoft 365
Manage insider risk in Microsoft 365
Module 3: Mitigate threats using Azure Defender
Use Azure Defender integrated with Azure Security Center, for Azure, hybrid cloud, and on-premises workload protection and security.
Plan for cloud workload protections using Azure Defender
Explain cloud workload protections in Azure Defender
Connect Azure assets to Azure Defender
Connect non-Azure resources to Azure Defender
Remediate security alerts using Azure Defender
Module 4: Create queries for Azure Sentinel using Kusto Query Language (KQL)
Write Kusto Query Language (KQL) statements to query log data to perform detections, analysis, and reporting in Azure Sentinel. This learning path will focus on the most used operators. The example KQL statements will showcase security related table queries.
Construct KQL statements for Azure Sentinel
Analyze query results using KQL
Build multi-table statements using KQL
Work with data in Azure Sentinel using Kusto Query Language
Module 5: Configure your Azure Sentinel environment
Get started with Azure Sentinel by properly configuring the Azure Sentinel workspace.
Introduction to Azure Sentinel
Create and manage Azure Sentinel workspaces
Query logs in Azure Sentinel
Use watchlists in Azure Sentinel
Utilize threat intelligence in Azure Sentinel
Module 6: Connect logs to Azure Sentinel
Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Azure Sentinel.
Connect data to Azure Sentinel using data connectors
Connect Microsoft services to Azure Sentinel
Connect Microsoft 365 Defender to Azure Sentinel
Connect Windows hosts to Azure Sentinel
Connect Common Event Format logs to Azure Sentinel
Connect syslog data sources to Azure Sentinel
Connect threat indicators to Azure Sentinel
Module 7: Create detections and perform investigations using Azure Sentinel
Detect previously uncovered threats and rapidly remediate threats with built-in orchestration and automation in Azure Sentinel. Threat detection with Azure Sentinel analytics
Threat response with Azure Sentinel playbooks
Security incident management in Azure Sentinel
Use entity behavior analytics in Azure Sentinel
Query, visualize, and monitor data in Azure Sentinel
Module 8: Perform threat hunting in Azure Sentinel
Proactively hunt for security threats using the Azure Sentinel powerful threat hunting tools.
Explain threat hunting concepts in Azure Sentinel
Threat hunting with Azure Sentinel
Hunt for threats using notebooks in Azure Sentinel
View outline in Word