وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SC-200: Microsoft Security Operations Analyst

سرفصل های دوره

Become a Microsoft SOC engineer Today!! Learn through lab excercises and practical demonstrations


1 - Introduction
  • 1 - Mandiant-Forecast-Report-2023.pdf
  • 1 - SC-200-Learning-Resources.pdf
  • 1 - SKILLS-GAINED-SC-200.pdf
  • 1 - The Need for SOC Team
  • 2 - SC200 Microsoft Security Operations Analyst Course Introduction
  • 2 - SC-200-Reviews.pdf
  • 3 - Microsoft-Digital-Defense-Report-2022.pdf
  • 3 - SC 200 May 2022 Update
  • 3 - sc 200 course details from ms and other references.zip
  • 4 - Reviews Thank You

  • 2 - Module 1 Mitigate threats using Microsoft 365 Defender
  • 5 - Module 1 Learning Objectives
  • 6 - Introduction to Threat Protection
  • 7 - Microsoft 365 Defender Suite
  • 8 - Typical Timeline of An Attack
  • 9 - Microsoft 365 Defender Interactive Demonstration
  • 10 - Mitigate incidents using Microsoft 365 Defender Chapter Introduction
  • 11 - How to Create your Playground Lab Environment
  • 11 - set up your microsoft 365 defender trial in a lab environment.zip
  • 12 - Microsoft 365 Defender portal Introduction
  • 13 - Managing Incidents
  • 14 - More about incidents
  • 15 - Simulate Incidents Tor Browser
  • 16 - Managing Incidents
  • 17 - Managing Alerts
  • 18 - Investigating Incidents MITRE ATTACK
  • 19 - Advance Hunting
  • 20 - Advance Hunting Schema
  • 21 - Exploring the Kusto Queries
  • 22 - Microsoft Threat Experts
  • 23 - Microsoft Defender for Office 365 Chapter Introduction
  • 24 - MIcrosoft Defender for Office 365 Key Capabilities
  • 25 - Microsoft Defender for Office 365 Key Capabilities II
  • 26 - Safeguard Your Organization M365 Defender for O365 Lab I
  • 27 - Safeguard Your Organization M365 Defender for O365 Lab II
  • 28 - Attack Simulation Lab Activity
  • 29 - Microsoft Defender for Identity Introduction
  • 30 - What is Microsoft Defender for Identity
  • 31 - Microsoft Defender for Identity Key Capabilities
  • 32 - Installing Sensors on Domain Controller 1
  • 33 - Installing Sensors on Domain Controller 2
  • 34 - Capturing Lateral Movements
  • 35 - Threat Hunting Lab
  • 36 - Microsoft Defender for Identity Sensors Architecture
  • 37 - Protect Your Identities with Azure AD Identity Protection Introduction
  • 38 - User Risks SignIn Risks
  • 39 - User risk policy Sign in risk policy Lab Activity
  • 40 - Cloud App Security Introduction
  • 41 - The Cloud App Security Framework
  • 42 - Conditional Access App Controls
  • 43 - What is Information Protection
  • 44 - Insider Risk Management Enable Auditing
  • 45 - Phases of Cloud App security
  • 46 - Cloud App security Phases Lab Activity
  • 47 - Data Loss Prevention Chapter Intro
  • 48 - DLP Alerts
  • 49 - Create Policies for DLP in Compliance Portal
  • 50 - Insider Risk Management
  • 51 - What is Insider Risk
  • 52 - Pain points of a Modern Workplace
  • 53 - Insider Risk management with M365 Defender
  • 54 - Insider Risk Management Permissions
  • 55 - Module 1 Summary

  • 3 - Module 2 Mitigate threats using Microsoft Defender for Endpoint
  • 56 - Module 2 Introduction
  • 56 - microsoft defender experts for hunting.zip
  • 56 - microsoft defender experts for hunting proactively hunts threats.zip
  • 57 - Defender for Endpoint Features
  • 58 - Defender for Endpoint Terminology
  • 59 - Onboarding devices to Defender
  • 59 - onboarding devices using gpo refernce.zip
  • 60 - Windows 10 Security Enhancements Chapter Introduction
  • 61 - Attack Surface Reduction Rules
  • 62 - Attack Surface Rules
  • 63 - Device Inventory
  • 64 - Device Investigation Alerts
  • 65 - Behavioral Blocking
  • 66 - Client Behavioral Blocking
  • 67 - EDR Block Mode
  • 68 - EDR Block Mode Lab Activity
  • 69 - Performing Actions on the device
  • 70 - Live Response
  • 71 - Perform Evidence and Entities Investigations
  • 72 - User Investigations
  • 73 - Advance Automated Remediation Features Endpoint
  • 74 - Managing File Uploads
  • 75 - Automation folder exclusion
  • 76 - File Level Investigation
  • 77 - Automating Device group remediation
  • 78 - Blocking Risky Devices using Intune Defender and Azure AD
  • 79 - Configure Alerts and Detections Chapter Introduction
  • 80 - Configuring Advance Features
  • 81 - Configuring Email Notifications
  • 82 - Indicators of Compromise
  • 83 - 28 Threat and Vulnerability Management Chapter Introduction
  • 84 - 29 Threat and Vulnerability Management Explanation
  • 85 - Module 2 Summary

  • 4 - Module 3 Mitigate threats using Microsoft Defender for Cloud
  • 86 - Module 3 Introduction
  • 87 - What is Azure Security Center
  • 88 - Microsoft Defender for cloud Features
  • 89 - Azure Defender for Cloud Lab Activity
  • 90 - CSPM and CWP
  • 91 - What resources are protected using Microsoft Defender
  • 92 - Benefits of Azure Defender for servers
  • 93 - Defender for App services
  • 94 - Defender for App services Lab
  • 95 - Defender for Storage Lab
  • 96 - Defender for SQL LAB
  • 97 - Defender for Keyvault
  • 98 - Defender for DNS
  • 99 - Defender for Kubernetes
  • 100 - Defender for Container Registry
  • 101 - Connect Azure assets to Azure Defender Chapter introduction
  • 102 - Asset Inventory LAB
  • 103 - Auto provisioning
  • 104 - Stored Event types
  • 105 - Manual Provisioning
  • 106 - Connect nonAzure reosurces to Defender
  • 107 - Onboarding Methods
  • 108 - Onboard GCP instance to Azure ARC
  • 109 - Onboarding AWS Services to Defender for cloud
  • 110 - Remediating Security Alerts Chapter Intro
  • 111 - Changing World and Attackers
  • 112 - What are Security alerts and notifications
  • 113 - How does defender work
  • 114 - Alert Severity Level
  • 115 - Continuous Monitoring and assesments
  • 116 - Mitre Attack tactics and alert types
  • 117 - Remediating Alerts
  • 118 - Automated Responses
  • 119 - Alert Supression
  • 120 - Module 3 Summary

  • 5 - Module 4 Create Queries for Microsoft Sentinel using Kusto Query Language
  • 121 - Module 4 Introduction
  • 122 - The Construct of KQL Language
  • 123 - The Lab Environment
  • 124 - Declaring Variables with Let
  • 125 - Search and Where Operator
  • 126 - Extend Operator
  • 127 - Order By Usage
  • 128 - Project Operator
  • 129 - Summarize Count and DCount Functions
  • 130 - ArgMax and ArgMin Functions
  • 131 - MakeList and MakeSet Functions
  • 132 - Render Operator
  • 133 - Bin Function
  • 134 - Union Operator
  • 135 - Module 4 Summary

  • 6 - Module 5 Microsoft Sentinel Environment Configuration
  • 136 - What is a SIEM Solution
  • 136 - microsoft defender experts for xdr.zip
  • 137 - Azure-Sentinel-Use-Cases-for-ATT-CK-based-Detection-Mitig.pdf
  • 137 - Microsoft-Sentinel-Deployment-Best-Practices-Guide.pdf
  • 137 - What is Microsoft Sentinel
  • 138 - Microsoft Sentinel Components
  • 139 - Data Connectors
  • 140 - Log Retention
  • 141 - Workbooks
  • 142 - Analytics Alerts
  • 143 - Threat Hunting
  • 144 - Incidents Investigations
  • 145 - Automation Playbooks
  • 146 - Creating Azure Sentinel Workspace
  • 147 - Azure Sentinel RBAC
  • 148 - Data Connectors
  • 149 - OnBoarding Windows host to Sentinel
  • 150 - Ingesting Events to Sentinel
  • 151 - Sentinel Watchlist
  • 152 - Sentinel Creating a watchlist for Tor Nodesedited
  • 153 - Sentinel Create Hunting Query
  • 154 - Sentinel Live Stream
  • 155 - Sentinel Capturing traffic from TOR Exit Nodes
  • 156 - Sentinel Create Analytical Rules
  • 157 - Analytical Rule Type Fusion
  • 158 - Analytical Rule Types Security Types
  • 159 - Analytical Rule Types ML based Behavioral Analytics
  • 160 - Analytical Rule Types Anomaly Scheduled Alerts and NRT
  • 161 - Creating Anayltics Rules based on Template
  • 162 - Creating Analytic Rules based on Wizard
  • 163 - Managing the Rules
  • 164 - Define Threat Intelligence CTI
  • 165 - Create TI Lab Activity

  • 7 - Module 6 Microsoft Sentinel Environment Connecting Logs
  • 166 - Module 6 Introduction
  • 167 - Connect M365 Defender to Sentinel
  • 168 - Office 365 Log Connector
  • 169 - Azure Activity Log Connector
  • 170 - Azure Active Directory Identity Protection Connector
  • 171 - Defender for Office 365 Connector
  • 172 - Defender for Endpoint Connector
  • 173 - Connect Threat Indicators to Microsoft Sentinel

  • 8 - Microsoft Sentinel Environment IncidentsThreat Response UEBA and Monitoring
  • 174 - Module 7 Introduction
  • 175 - Key Concepts of Incident Management
  • 176 - Investigations in Azure Sentinel
  • 177 - Key Concepts of Incident Management II
  • 178 - Incident Management in Microsoft Sentinel I
  • 179 - Incident Management in Microsoft Sentinel II
  • 180 - Brute Force attack against Azure Portal Simulation
  • 181 - Threat Response with Microsoft Sentinel Playbooks Introduction Use Case
  • 182 - Step 1 Creating Analytical Rule to look for Role membership changes
  • 183 - Step 2 Integrate Log Analytics with Azure AD Audit Logs
  • 184 - Step 3 Verify Log Analytics
  • 185 - Step 4 Incident Creation in Sentinel
  • 186 - Step 5 Create Logic App to Integrate with Microsoft Teams
  • 187 - Step 6 Edit Analytical Rule to add Logic App Playbooks
  • 188 - Finally Testing the Integration
  • 189 - UEBA User Entity Behavior Analytics Introduction
  • 190 - Entity Behaviour Lab I
  • 191 - Entity Behaviour Lab II
  • 192 - Workbooks Introduction
  • 193 - Create Workbooks Using Template
  • 194 - Create Workbook from scratch
  • 194 - Microsoft-Sentinel-Technical-Playbook-for-MSSPs.pdf

  • 9 - Module 8 Perform Threat Hunting with Microsoft Sentinel
  • 195 - Module 8 Introduction
  • 196 - Cyber Security Threat Hunting
  • 197 - The Need for Proactive Hunting
  • 198 - Develop a Threat Hunting Hypothesis
  • 199 - Threat Hunting Recap
  • 200 - Notebooks Introduction
  • 201 - Sentinel Notebooks Lab Activity

  • 10 - SC 200 Microsoft Security Operations Analyst Course Summary
  • 202 - SC 200 Microsoft Security Operations Analyst Course Summary
  • 202 - additional basic and advance training links from ms.zip
  • 202 - additional microsoft resources and refernce.zip
  • 202 - defender for cloud training links from ms.zip
  • 202 - defender for endpoint training link and references from ms.zip
  • 202 - defender for identity training and reference links from ms.zip
  • 202 - defender for office 365 training from ms.zip
  • 202 - microsoft defender for iot training from ms.zip
  • 202 - microsoft identity training links from ms.zip
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 10199
    حجم: 5494 مگابایت
    مدت زمان: 764 دقیقه
    تاریخ انتشار: ۴ اردیبهشت ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید