This course provides a comprehensive understanding of cybersecurity operations and Microsoft security technologies, integrating fundamental concepts with advanced threat detection, remediation, and automation tools. You will explore core principles of Microsoft Defender XDR, Microsoft Sentinel, and Azure security solutions, learning how to investigate, respond to, and mitigate cyber threats effectively.

推荐体验
推荐体验
中级
Security professionals, IT administrators, SOC Analysts, Project Managers, and cybersecurity practitioners are focused on security operations.
推荐体验
推荐体验
中级
Security professionals, IT administrators, SOC Analysts, Project Managers, and cybersecurity practitioners are focused on security operations.
您将获得的技能
- Incident Management
- Cyber Threat Hunting
- Cyber Threat Intelligence
- AI Security
- Anomaly Detection
- Malware Protection
- Incident Response
- Endpoint Detection and Response
- Threat Detection
- Vulnerability Management
- Microsoft Copilot
- Cloud Computing
- Cyber Operations
- Computer Security Incident Management
- Cloud Security
- Security Information and Event Management (SIEM)
- Endpoint Security
- Threat Management
要了解的详细信息

添加到您的领英档案
16 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有6个模块
This week provides a comprehensive introduction to Azure AI and Machine Learning services, focusing on their core capabilities, components, and real-world applications. Learners will gain insight into the tools and technologies that drive intelligent solutions on Azure and explore the role of a data scientist in the AI development lifecycle. This week also covers key machine learning concepts, the various types of AI workloads, and how to evaluate the effectiveness of AI solutions. Additionally, learners will become familiar with Microsoft’s Responsible AI principles and best practices, equipping them to design and implement ethical, secure, and inclusive AI systems.
涵盖的内容
19个视频2篇阅读材料3个作业
19个视频• 总计96分钟
- Course Overview• 4分钟
- Exam Overview• 4分钟
- What is Microsoft Defender XDR?• 4分钟
- Key Benefits of Microsoft Defender XDR• 4分钟
- Microsoft Defender XDR vs. Traditional Security Tools• 4分钟
- Threat Analytics Overview• 4分钟
- Creating Lab Environment - Step by Step• 8分钟
- Connecting Microsoft Defender XDR to Microsoft Sentinel• 9分钟
- Alert Configuration & Notifications - Incidents• 6分钟
- Alert Configuration & Notifications - Threat Analytics• 5分钟
- Automated Investigation & Response (AIR) - Theory• 6分钟
- Automated Investigation & Response (AIR) - Demo• 4分钟
- Investigating & Responding to Incidents• 5分钟
- Custom Detections Rules• 6分钟
- Alert Tuning & Deception• 4分钟
- Best Practices for Microsoft Defender XDR• 4分钟
- Data Loss Prevention (DLP) for protecting sensitive information• 6分钟
- Aligning security solutions with MCRA for specific scenarios• 8分钟
- Module 1- Exam Tips• 3分钟
2篇阅读材料• 总计70分钟
- Welcome to the Course• 40分钟
- Microsoft Defender XDR - Overview• 30分钟
3个作业• 总计120分钟
- Getting Started with Microsoft Defender XDR - Practice Assignment• 30分钟
- Proactive Threat Detection & Incident Response - Practice Assignment• 40分钟
- Microsoft Defender XDR - Graded Assignment• 50分钟
This week, we will dive into advanced security configurations, endpoint protection strategies, and Defender for Endpoint (MDE) integrations with Azure Arc. You will gain insights into how Microsoft Defender XDR enhances device security, particularly for non-Azure and unmanaged devices. We begin by exploring how Azure Arc integrates with Defender for Endpoint, enabling security teams to protect and manage devices outside traditional cloud environments. You’ll also learn the process of onboarding non-Azure devices to Microsoft Defender for Endpoint (MDE) through both theoretical explanations and hands-on demonstrations. By the end of this week, you will have a deep understanding of endpoint security enhancements, enabling you to configure, monitor, and protect devices efficiently with Defender for Endpoint and Sentinel.
涵盖的内容
30个视频1篇阅读材料4个作业
30个视频• 总计144分钟
- Microsoft Defender for Endpoint Overview• 6分钟
- Introduction to Azure ARC• 5分钟
- Azure Arc and its integration with Defender for endpoints• 4分钟
- Onboarding Non-Azure Devices to MDE• 7分钟
- Onboarding Non-Azure Devices to MDE - Demo• 5分钟
- Advanced Features Overview• 5分钟
- Advance Feature - Restrict Correlation• 5分钟
- Advanced Feature - Enable EDR in Block Mode• 5分钟
- Advanced Feature - Hide potential duplicate device records• 5分钟
- Advanced Feature -Allow or Block File• 4分钟
- Advanced Feature - Custom Network Indicators• 4分钟
- Advanced Feature - Tamper Protection• 3分钟
- Advanced Feature - Web content filtering• 3分钟
- Advanced Feature - Live Response• 5分钟
- Advanced Feature - Endpoint Attack Notifications• 4分钟
- What are Unmanaged Devices• 5分钟
- Unmanaged Devices - Discovery Setup• 7分钟
- Device Discovery - Exclusions• 2分钟
- Device Discovery - Configuring Monitored Networks• 3分钟
- Device Discovery - Authenticated Scans• 9分钟
- Unmanaged Device Protection• 6分钟
- Unmanaged Device Protection - Demo• 4分钟
- Managing Remediations• 5分钟
- Managing Remediations - Demo• 5分钟
- Defender Vulnerability Management• 6分钟
- Defender Vulnerability Management-Demo• 4分钟
- Device Timeline- Demo• 4分钟
- Live Response - Demo• 5分钟
- Module 2 - Exam Tips• 4分钟
- Advanced Feature - Endpoint Attack Notifications• 4分钟
1篇阅读材料• 总计30分钟
- Microsoft Defender for Endpoint - Overview• 30分钟
4个作业• 总计190分钟
- Integrating and Enhancing Endpoint Security with Microsoft Defender and Azure Arc - Practice Assignment• 40分钟
- Untitled• 50分钟
- Comprehensive Management and Protection of Unmanaged Devices with Microsoft Defender - Practice Assignment• 40分钟
- Microsoft Defender for Endpoint - Graded Assignment• 60分钟
Welcome to Week 3 of the SC-200: Microsoft Security Operations Analyst course. This week, we will explore the powerful capabilities of Microsoft Sentinel, a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solution. Sentinel enables security teams to collect, analyze, and respond to security threats across hybrid environments using built-in connectors, automated playbooks, and advanced analytics. As we progress, you’ll be introduced to Kusto Query Language (KQL) and its role in security incident investigations, filtering logs, joining tables, and analyzing threat patterns. Through hands-on exercises, you will develop custom analytics rules, set up STIX/TAXII threat intelligence feeds, and configure automated playbooks using Logic Apps. By the end of this week, you will have the expertise to deploy, monitor, and optimize Microsoft Sentinel for proactive security analytics, ensuring efficient incident response and anomaly detection.
涵盖的内容
20个视频1篇阅读材料3个作业
20个视频• 总计100分钟
- What is Microsoft Sentinel?• 5分钟
- Workspace Planning in Microsoft Sentinel• 6分钟
- Overview of built-in connectors• 5分钟
- Overview of built-in connectors - Demo• 5分钟
- Content Hub - Demo• 5分钟
- Basics of KQL syntax Overview• 6分钟
- Key commands for filtering, joining tables• 7分钟
- How KQL is specifically used in Sentinel• 6分钟
- Introduction to KQL - Demo• 5分钟
- Analytics Rules Overview• 4分钟
- Analytics Rules - Demo• 8分钟
- Investigating incidents, entities, and timelines - Overview• 4分钟
- Investigating incidents, entities, and timelines - Demo• 4分钟
- STIX/TAXII feeds• 5分钟
- Connecting to STIX/TAXII feeds - LAB• 4分钟
- Introduction to playbooks (Logic Apps)• 4分钟
- Triggering playbooks based on alerts• 4分钟
- Use cases for automated remediation tasks• 5分钟
- Anomaly detection with built-in features• 5分钟
- Module 3- Exam Tips• 3分钟
1篇阅读材料• 总计30分钟
- Microsoft Sentinel - Overview• 30分钟
3个作业• 总计100分钟
- Optimizing Security Operations with Microsoft Sentinel and KQL - Practice Assignment• 30分钟
- Incident Investigation and Automated Remediation with Microsoft Sentinel Tools - Practice Assignment• 30分钟
- Microsoft Sentinel - Graded Assignment• 40分钟
Welcome to Week 4 of the SC-200: Microsoft Security Operations Analyst course. This week, we will focus on Microsoft Security Exposure Management, cloud security solutions, and governance strategies within the Microsoft Defender ecosystem. We begin by exploring Security Exposure Management, understanding its role in identifying security risks, prioritizing remediation efforts, and optimizing cloud security posture. You’ll also examine the new alert suppression experience, improving incident response workflows to minimize unnecessary alerts and enhance security monitoring efficiency. Next, we will dive into Microsoft Sentinel’s data ingestion optimization, exploring how to refine log management, enhance behavior analytics, and implement best practices for proactive security insights. Throughout the week, we’ll cover essential cloud security solutions, including Microsoft Defender for Cloud, Defender for Office 365, Defender for Cloud Apps, and Defender for Cloud Workload Protection, ensuring seamless security governance and compliance across enterprise environments. By the end of the week, you will develop practical expertise in managing cloud security risks, implementing policies, and utilizing Microsoft Entra ID protection for identity threat detection. You will also gain insights into Azure Lighthouse, which enables secure management of cloud resources across multiple tenants.
涵盖的内容
16个视频1篇阅读材料2个作业
16个视频• 总计77分钟
- Microsoft Security Exposure Management - Overview• 4分钟
- Microsoft Security Exposure Management - Demo• 5分钟
- New Alert Suppression Experience - Overview• 4分钟
- New Alert Suppression Experience - Demo• 3分钟
- Monitor and optimize data ingestion in Microsoft Sentinel• 4分钟
- Behavior Analytics in Microsoft Sentinel• 7分钟
- Best Practices - Behavior Analytics• 3分钟
- Microsoft Defender family• 6分钟
- Microsoft Defender for Cloud• 6分钟
- Microsoft Defender for Cloud Apps• 6分钟
- Microsoft Defender for Office 365• 6分钟
- Policies & Governance with Microsoft Defender for Cloud Apps• 5分钟
- Microsoft Defender for Cloud Workload Protection• 5分钟
- Investigating Risk with Microsoft Entra ID Protection• 5分钟
- Purpose of Azure Lighthouse• 5分钟
- Module 4 - Exam Tips• 4分钟
1篇阅读材料• 总计30分钟
- Microsoft Defender and Sentinel: Unified Security Operations and Exposure Management - Overview• 30分钟
2个作业• 总计90分钟
- Comprehensive Risk Management and Advanced Threat Protection - Practice Assignment• 40分钟
- Microsoft Defender and Sentinel: Unified Security Operations and Exposure Management - Graded Assignment• 50分钟
This week, we will focus on proactive threat hunting techniques, leveraging Microsoft Sentinel, MITRE ATT&CK frameworks, and advanced security queries to detect and respond to sophisticated cyber threats. We begin by understanding threat hunting fundamentals and how security analysts use structured methodologies to identify potential vulnerabilities before they escalate into incidents. You will explore the MITRE ATT&CK framework, gaining insights into attacker tactics, techniques, and procedures (TTPs) to improve security detection and response strategies Next, we will dive into threat hunting queries, covering query-building principles, filtering techniques, and practical demonstrations within Microsoft Sentinel Livestream. You’ll also learn how to enhance security operations using the SOC efficiency workbook, enabling teams to streamline investigations and optimize security workflows.
涵盖的内容
12个视频1篇阅读材料2个作业
12个视频• 总计53分钟
- Introduction to threat Hunting• 6分钟
- Explore MITRE ATT&CK• 5分钟
- Explore Threat Hunting Queries• 5分钟
- Explore Threat Hunting Queries - Demo• 7分钟
- Microsoft Sentinel Livestream - Overview• 3分钟
- Microsoft Sentinel Livestream - Demo• 4分钟
- SOC efficiency workbook - Overview• 3分钟
- SOC efficiency workbook - Demo• 4分钟
- Hunt with a Search Job - Overview• 5分钟
- Hunt with a Search Job - Demo• 4分钟
- Hunt for threats using notebooks• 4分钟
- Module 5- Exam Tips• 4分钟
1篇阅读材料• 总计30分钟
- Microsoft Sentinel: Threat Hunting Services - Overview• 30分钟
2个作业• 总计60分钟
- Threat Hunting and Security Optimization with Microsoft Sentinel - Practice Assignment• 25分钟
- Microsoft Sentinel: Threat Hunting Services - Graded Assignment• 35分钟
This week, we will explore Microsoft Copilot for Security, an AI-driven security assistant designed to enhance threat detection, incident response, and security operations efficiency. You will gain insights into how Copilot leverages AI to accelerate security investigations, helping organizations identify threats, assess risks, and automate response workflows. Next, we will explore Microsoft Security Copilot's best practices, focusing on how to integrate Copilot into security workflows, manage plugins, optimize file handling, and connect security data sources using built-in connectors. You will also learn about permissions management, cost monitoring, and operational considerations for deploying Copilot in enterprise security environments. To solidify your understanding, we will conduct hands-on demos, showcasing how Copilot assists in incident analysis, threat detection, and risk investigation. By the end of this week, you’ll have a comprehensive understanding of Microsoft Copilot for Security, including its role in modern security strategies, exam preparation insights, and career pathways in AI-driven cybersecurity.
涵盖的内容
16个视频2篇阅读材料2个作业
16个视频• 总计74分钟
- Microsoft Copilot - Overview• 4分钟
- Why should organizations adopt Microsoft Copilot• 4分钟
- Microsoft Copilot - Demo• 5分钟
- What is Microsoft Copilot for Security?• 3分钟
- Microsoft Copilot for Security - Features and Usecases• 5分钟
- Microsoft Security Copilot: Best Practices• 6分钟
- Microsoft Copilot for Security - Demo• 6分钟
- Promptbooks in Copilot for Security• 4分钟
- Manage plugins and files in Microsoft Copilot for Security• 4分钟
- Microsoft Copilot for Security - Connectors• 6分钟
- Manage permissions and roles in Copilot for Security• 4分钟
- Monitor Copilot for Security capacity and cost• 5分钟
- Identify threats and risks by using Copilot for Security• 5分钟
- Investigate incidents by using Copilot for Security• 6分钟
- Module 6 - Exam Tips• 5分钟
- Conclusion, What's Next, Job Roles, and Best Practices• 3分钟
2篇阅读材料• 总计60分钟
- Microsoft Security Copilot Overview• 30分钟
- Course Summary and Key Takeaways• 30分钟
2个作业• 总计110分钟
- Implement and use Microsoft Copilot for Security - Practice Assignment• 50分钟
- Microsoft Security Copilot- Graded Assignment• 60分钟
位教师

提供方

提供方

Providing certification training since the year 2000, Whizlabs is the pioneer among online training providers across the globe. We are dedicated to helping you learn the skills you need to transform your career in the IT industry. We provide certification training in the form of Video Courses, Practice Tests, Hands-on Labs and Sandbox in various disciplines such as Cloud Computing, DevOps, Cyber Security, Java, Big Data, Snowflake, CompTIA, Agile, Linux, CCNA, Blockchain, and much more.
从 Security 浏览更多内容

课程

课程

课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,


