وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SC-200 Microsoft Security Operations Analyst

سرفصل های دوره

Learn all about Microsoft security services, Microsoft Sentinel, KQL, Microsoft 365 Defender suite and get certified


01 - Introduction
  • 001 Instructor Introduction
  • 002 About the course
  • 003 Configuring the Lab Environment
  • 39791888-s1l2-about-the-course-resources.zip
  • 39791902-s1l3-configuring-the-lab-environment-resource.zip
  • 39791904-Import-User-Sample.csv

  • 02 - Mitigate threats using Microsoft 365 Defender
  • 001 Threat Protection with Microsoft 365 Defender
  • 002 Incidents in Microsoft 365 Defender
  • 003 Remediate risks with Microsoft Defender for O365
  • 004 Microsoft Defender for Identity
  • 005 Azure AD Identity Protection
  • 006 Micrososft Defender for Cloud Apps
  • 007 Respond to DLP Alerts
  • 008 Manage Insider Risk Management in Microsoft 365
  • 39791940-s2l1-threat-protection-with-microsoft-365-defender-resource.zip
  • 39791946-s2l2-incidents-in-microsoft-365-defender-resource.zip
  • 39791950-s2l3-remediate-risks-with-microsoft-defender-for-o365-resource.zip
  • 39791952-s2l4-microsoft-defender-for-identities-resource.zip
  • 39791956-s2l5-azure-ad-identity-protection-resource.zip
  • 39791958-s2l6-micrososft-defender-for-cloud-apps-resource.zip
  • 39791960-s2l7-respond-to-dlp-alerts-resource.zip
  • 39791962-s2l8-manage-insider-risk-management-in-microsoft-365-resource.zip

  • 03 - Mitigate threats using Microsoft Defender for Endpoint
  • 001 Protect against threats with Microsoft Defender for Endpoint
  • 002 Deploy the Microsft Defender for Endpoint environment
  • 003 Implement Windows Security Enhancements
  • 004 Device Investigations
  • 005 Perform actions on a device
  • 006 Perform evidence and entities investigations
  • 007 Configure and manage automation
  • 008 Configure alerts and detections
  • 009 Threat and Vulnerability Management
  • 39792098-s3l1-protect-against-threats-with-microsoft-defender-for-endpoint-resource.zip
  • 39792100-s3l2-deploy-the-microsft-defender-for-endpoint-environment-resource.zip
  • 39792104-s3l3-implement-windows-security-enhancements-resource.zip
  • 39792106-s3l4-device-investigations-resource.zip
  • 39792108-s3l5-perform-actions-on-a-device-resource.zip
  • 39792112-s3l6-perform-evidence-and-entities-investigations-resource.zip
  • 39792116-s3l7-configure-and-manage-automation-resource.zip
  • 39792120-s3l8-configure-alerts-and-detections-resource.zip
  • 39792122-s3l9-threat-and-vulnerability-management-resource.zip

  • 04 - Mitigate threats using Microsoft Defender for Cloud
  • 001 Plan for cloud workload protections using Microsoft Defender for Cloud
  • 002 Cloud workload protections in Microsoft Defender for Cloud
  • 003 Connect Azure Assets To Microsoft Defender for Cloud
  • 004 Connect non-Azure resources to Microsoft Defender for Cloud
  • 005 Security Alerts in Microsoft Defender for Cloud
  • 39792220-s4l1-plan-for-cloud-workload-protections-using-microsoft-defender-for-cloud-resources.zip
  • 39792238-s4l2-cloud-workload-protections-in-microsoft-defender-for-cloud-resource.zip
  • 39792242-s4l3-connect-azure-assets-to-microsoft-defender-for-cloud-resource.zip
  • 39792250-s4l4-connect-non-azure-resources-to-microsoft-defender-for-cloud-resource.zip
  • 39792252-s4l5-security-alerts-in-microsoft-defender-for-cloud-resource.zip

  • 05 - Kusto Query Language queries for Microsoft Sentinel
  • 001 Construct KQL statements for Microsoft Sentinel
  • 002 Analyze query results
  • 003 Build Multi-Table queries in KQL
  • 004 Work with string data using KQL
  • 39792390-s5l1-construct-kql-statements-for-microsoft-sentinel-demo-queries.zip
  • 39792394-s5l1-construct-kql-statements-for-microsoft-sentinel-resource.zip
  • 39792400-s5l2-analyze-query-results-demo-queries.zip
  • 39792404-s5l2-analyze-query-results-resource.zip
  • 39792406-s5l3-build-multi-table-queries-in-kql-demo-queries.zip
  • 39792408-s5l3-build-multi-table-queries-in-kql-resource.zip
  • 39792410-s5l4-work-with-string-data-using-kql-demo-queries.zip
  • 39792412-s5l4-work-with-string-data-using-kql-resource.zip

  • 06 - Configure Microsoft Sentinel
  • 001 Microsoft Sentinel Overview
  • 002 Create and Manage Microsoft Sentinel workspaces
  • 003 Query logs in Microsoft Sentinel
  • 004 Use Watchlists in Microsoft Sentinel
  • 005 Use Threat Intelligence in Microsoft Sentinel
  • 39792546-s6l1-microsoft-sentinel-overview-resource.zip
  • 39792550-s6l2-create-and-manage-microsoft-sentinel-workspaces-resource.zip
  • 39792552-s6l3-query-logs-in-microsoft-sentinel-resource.zip
  • 39792556-s6l4-use-watchlists-in-microsoft-sentinel-resource.zip
  • 39792558-s6l5-use-threat-intelligence-in-microsoft-sentinel-resource.zip

  • 07 - Connect logs to Microsoft Sentinel
  • 001 Connect Data to Microsoft Sentinel using Data Connectors
  • 002 Connect Microsoft 365 Defender to Microsoft Sentinel
  • 003 Connect Microsoft Services to Microsoft Sentinel
  • 004 Connect Windows Hosts to Microsoft Sentinel
  • 005 Connect CEF logs to Microsoft Sentinel
  • 006 Connect Syslog data to Microsoft Sentinel
  • 007 Connect Threat Indicators to Microsoft Sentinel
  • 39792666-s7l1-connect-data-to-microsoft-sentinel-using-data-connectors-resource.zip
  • 39792668-s7l2-connect-microsoft-365-defender-to-microsoft-sentinel-resource.zip
  • 39792672-s7l3-connect-microsoft-services-to-microsoft-sentinel-resource.zip
  • 39792676-s7l4-connect-windows-hosts-to-microsoft-sentinel-resource.zip
  • 39792678-s7l5-connect-cef-logs-to-microsoft-sentinel-resource.zip
  • 39792680-s7l6-connect-syslog-data-to-microsoft-sentinel-resource.zip
  • 39792682-s7l7-connect-threat-indicators-to-microsoft-sentinel-resource.zip

  • 08 - Detections and investigations using Microsoft Sentinel
  • 001 Threat Detection with Microsoft Sentinel Analytics
  • 002 Security Incident managent in Microsoft Sentinel
  • 003 Threat Response with Microsoft Sentinel Playbooks
  • 004 Entity Behaviour Analytics in Microsoft Sentinel
  • 005 Workbooks in Microsoft Sentinel
  • 39792756-s8l1-threat-detection-with-microsoft-sentinel-analytics-resource.zip
  • 39792764-s8l2-security-incident-managent-in-microsoft-sentinel-resource.zip
  • 39792766-s8l3-threat-response-with-microsoft-sentinel-playbooks-resource.zip
  • 39792768-s8l4-entity-behaviour-analytics-in-microsoft-sentinel-resource.zip
  • 39792772-s8l5-workbooks-in-microsoft-sentinel-resource.zip

  • 09 - Threat hunting in Microsoft Sentinel
  • 001 Threat Hunting Concepts in Microsoft Sentinel
  • 002 Threat Hunting with Microsoft Sentinel
  • 003 Notebooks in Microsoft Sentinel
  • 39792826-s9l1-threat-hunting-concepts-in-microsoft-sentinel-resource.zip
  • 39792828-s9l2-threat-hunting-with-microsoft-sentinel-resource.zip
  • 39792830-s9l3-notebooks-in-microsoft-sentinel-resource.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 423
    حجم: 3856 مگابایت
    مدت زمان: 768 دقیقه
    تاریخ انتشار: 22 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید