Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Certified Security Operations Analyst Associate SC200
New section
Sc-200 part 1 sc 200 Introduction (16:11)
sc-200 part 2 sc 200 Introduction (8:37)
sc-200 part 3 sc 200 Lab (7:50)
sc-200 part 04 Introduction to Threat Hunting (7:04)
sc-200 part 5 The Microsoft 365 Defender suits (2:54)
sc-200 part 06 Timeline of Attacks (7:49)
sc-200 part 7 Security Operations (3:09)
sc-200 part 8 Microsoft Defender XDR Lab Set up (3:15)
sc-200 part 9 Microsoft 365 Defender Part-I (3:46)
sc200 part 10 Microsoft 365 Defender Part-2 (20:01)
sc-200 part 11 Microsoft Defender MITRE ATT&CK (8:19)
sc-200 part 12 Microsoft Defender Hunting (2:18)
sc-200 part 13 Microsoft Defender Advanced Hunting Part-I (4:19)
sc-200 part 14 Microsoft Defender Advanced Hunting Part-2 (7:43)
sc-200 part 15 Microsoft Threat Experts (2:17)
sc-200 part 16 Remediate user Risks using M365 Defender for 0365 (6:00)
sc-200 part 17 Microsoft Defender O365 Part-1 (3:30)
sc-200 part 18 Microsoft Defender O365 Part-2 (12:30)
sc-200 part 19 Microsoft Defender O365 Part-3 (3:43)
sc-200 part 20 Microsoft Defender O365 Part-4 (9:00)
sc-200 part 21 Microsoft Defender for Identity (1:05)
sc-200 part 22 Microsoft Defender for Identity (3:27)
sc-200 part 23 Key Capabilities Microsoft Defender for Identity- (13:12)
sc-200 part 24. Microsoft Defender for Identity Sensor (4:29)
sc-200 part 25 Microsoft Azure Virtual Machine (3:48)
sc-200 part 26 Azure ATP Sensor Setup (1:31)
sc-200 part 27 Microsoft Defender for Identity (Part - 1) (1:42)
sc-200 part 28 Microsoft Defender for Identity (Part - 2) (2:21)
sc-200 part 29 Microsoft Defender for Identity (Part - 3) (6:38)
sc-200 part 30 Azure ATP Architecture (2:20)
sc-200 part 31 Entra ID Identity Protection Part-1 (2:09)
sc-200 part 32 Entra ID Identity Protection Part-2 (4:33)
sc-200 part 33 Entra ID Identity Protection Part-3 (9:59)
sc-200 part 34 Microsoft Cloud App Security (5:42)
SC-200 part 35 Conditional Access App Control (6:40)
SC-200 part 36 Information Protection (3:53)
sc-200 part 37 Insider Risk Managemnet (1:27)
sc-200 part 38 Phases of Cloud App Security (3:28)
sc-200 part 39 SOC Analyst (4:21)
sc-200 part 40 Data Loss Prevention (6:56)
sc-200 part 41 Insider Risk Management M365 Part-1 (7:54)
sc-200 part 42 Insider Risk Management M365 Part-2 (8:50)
sc-200 part 43 Mitigating threats using Microsoft 365 defender for endpoint (1:18)
sc-200 part 44 Defender for Endpoints Features (2:50)
sc-200 part 45 Terminology of Microsoft Defender (2:19)
sc-200 part 46 Microsoft Azure Service (5:57)
sc-200 part 47 Microsoft Azure Resources (1:59)
sc-200 part 48 Microsoft Defender Device Inventory (4:49)
sc-200 part 49 Microsoft Defender Virtual Machine (4:45)
sc-200 part 50 EDR Block Mode (1:23)
sc-200 part 51 EDR in Block mode Part-2 (2:29)
sc-200 part 52 Attack Surface Reduction Part-I (4:03)
sc-200 part 53 Attack Surface Reduction Part-2 (9:23)
sc-200 part 54 Windows Defender ATP Onboarding Package Installation (1:27)
sc-200 part 55 Windows PowerShell ISE (2:26)
sc-200 part 56 Microsoft Defender Incidents (3:17)
sc-200 part 57 Microsoft Defender Device Inventory (5:25)
sc-200 part 58 Microsoft Defender Device Inventory Part-2 (1:57)
sc-200 part 59 Microsoft Defender Incidents (2:54)
sc-200 part 60 Microsoft Defender Endpoints (4:56)
sc-200 part 61 Suspicious Process Injection Observed (5:28)
sc-200 part 62 Enpoints (3:57)
sc-200 part 63 Email in Enpoint (2:50)
sc-200 part 64 Microsoft 365 Access (5:27)
sc-200 part 65 Threat & Vulnerability Management (5:48)
sc-200 part 66 introduction (1:26)
sc-200 part 67 azure security center (2:55)
sc-200 part 68 defender overview (5:46)
sc-200 part 69 cspm and cwp (3:26)
sc-200 part 70 benifits of azure defender (8:30)
sc-200 part 71 defender for app service (6:48)
sc-200 part 72 defender for storage (5:17)
sc-200 part 73 creating sql db (4:04)
sc-200 part 74 defender for sql (5:38)
sc-200 part 75 defender for key vault (4:07)
sc-200 part 76 defender for DNS (4:03)
sc-200 part 77 Azure Kubernetes Service (4:15)
sc-200 part 78 Deploying Cluster (2:30)
sc-200 part 79 Defender for Azure Kubernetes Service (AKS) (2:12)
sc-200 part 80 Container registry for defender (5:23)
sc-200 part 81 Configure assets (1:00)
sc-200 part 82 Inventory (3:17)
sc-200 part 83 auto provisioning (2:18)
sc-200 part 84 attackers (2:19)
sc-200 part 85 security alerts and notification (1:36)
sc-200 part 86 how defender works (4:02)
sc-200 part 87 severity of alerts (2:40)
sc-200 part 88 continous mointoring (1:57)
sc-200 part 89 Mitre attack (5:32)
sc-200 part 90 workflow automation (3:42)
sc-200 part 91 supression alerts (4:10)
sc-200 part 92 What is SIME solutions (2:15)
sc-200 part 94 components (0:46)
sc-200 part 93 Microsoft sentinel (2:47)
sc-200 part 95 data connectors (1:19)
sc-200 part 96 components explaination overview (6:42)
sc-200 part 97 log analytics workspace (5:38)
SC-200 PART 98 data connectors (9:06)
sc-200 part 99 connecting vm using data connector (7:22)
sc-200 part 100 ingest data from vm (4:25)
sc-200 part 101 watchlist part 1 (2:27)
sc-200 part 102 watch list part 2 (6:17)
sc-200 part 103 query hunting (4:18)
sc-200 part 104 testing vm in tor (6:27)
sc-200 part 105 fusion alerts (4:02)
sc-200 part 106 microsoft security (1:50)
sc-200 part 108 analytical rule template (2:23)
sc-200 part 109 analytical wizard method (9:07)
sc-200 part 110 managing the rules (2:55)
sc-200 part 111 pthreat intelligence (3:36)
sc-200 part 112 threat intelligence lab (4:19)
sc-200 part 113 intro (0:58)
sc-200 part 114 connect 365 defender for sentinel (1:24)
sc-200 part 115 office 365 connector (4:14)
sc-200 part 116 active directory connector (3:10)
sc-200 part 117 entra id connector (3:01)
sc-200 part 118 entra id connector (2:53)
sc-200 part 119 office 365 defender connectors (3:25)
sc-200 part 120 defender for endpoints (6:12)
sc-200 part 121 threat intelligence indicator (6:17)
sc-200 part 122 intro (0:56)
sc-200 part 123 Incidents (6:11)
sc-200 part 124 key concepts of MS sentienl 1 (2:41)
sc-200 part 125 cloud apps policy (6:31)
sc-200 part 126 incident management part 2 (4:44)
sc-200 part 127 playbook intro (3:05)
sc-200 part 128 playbook (8:07)
sc-200 part 129 UEBA intro (5:39)
SC-200 part 130 UEBA demo (9:42)
sc-200 part 131 workbooks intro (1:43)
sc-200 part 132 workbooks (10:23)
sc-200 part 133 new workbooks (6:41)
sc-200 part 134 threat hunting intro (0:58)
sc-200 part 135 cyber threat hunt (3:03)
SC-200 part 136 proactive hunting (2:27)
sc-200 part 137 hypothesis (3:44)
sc-200 part 138 hunting queries (5:42)
sc-200 part 122 intro
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock