This course provides a comprehensive understanding of cybersecurity operations and Microsoft security technologies, integrating fundamental concepts with advanced threat detection, remediation, and automation tools. You will explore core principles of Microsoft Defender XDR, Microsoft Sentinel, and Azure security solutions, learning how to investigate, respond to, and mitigate cyber threats effectively.

Exam Prep SC-200: Microsoft Security Operations Analyst

Exam Prep SC-200: Microsoft Security Operations Analyst

Instructor: Whizlabs Instructor
Access provided by SR University
Recommended experience
Recommended experience
Intermediate level
Security professionals, IT administrators, SOC Analysts, Project Managers, and cybersecurity practitioners are focused on security operations.
Recommended experience
Recommended experience
Intermediate level
Security professionals, IT administrators, SOC Analysts, Project Managers, and cybersecurity practitioners are focused on security operations.
Skills you'll gain
- Security Information and Event Management (SIEM)
- Cyber Threat Intelligence
- Anomaly Detection
- Cloud Security
- Incident Response
- Malware Protection
- Endpoint Detection and Response
- Cyber Threat Hunting
- Threat Detection
- Incident Management
- Endpoint Security
- Computer Security Incident Management
- Vulnerability Management
- AI Security
- Threat Management
- Cyber Operations
- Cloud Computing
- Microsoft Copilot
Tools you'll learn
Details to know

Add to your LinkedIn profile
16 assignments
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
This week provides a comprehensive introduction to Azure AI and Machine Learning services, focusing on their core capabilities, components, and real-world applications. Learners will gain insight into the tools and technologies that drive intelligent solutions on Azure and explore the role of a data scientist in the AI development lifecycle. This week also covers key machine learning concepts, the various types of AI workloads, and how to evaluate the effectiveness of AI solutions. Additionally, learners will become familiar with Microsoft’s Responsible AI principles and best practices, equipping them to design and implement ethical, secure, and inclusive AI systems.
What's included
19 videos2 readings3 assignments
19 videos• Total 96 minutes
- Course Overview• 4 minutes
- Exam Overview• 4 minutes
- What is Microsoft Defender XDR?• 4 minutes
- Key Benefits of Microsoft Defender XDR• 4 minutes
- Microsoft Defender XDR vs. Traditional Security Tools• 4 minutes
- Threat Analytics Overview• 4 minutes
- Creating Lab Environment - Step by Step• 8 minutes
- Connecting Microsoft Defender XDR to Microsoft Sentinel• 9 minutes
- Alert Configuration & Notifications - Incidents• 6 minutes
- Alert Configuration & Notifications - Threat Analytics• 5 minutes
- Automated Investigation & Response (AIR) - Theory• 6 minutes
- Automated Investigation & Response (AIR) - Demo• 4 minutes
- Investigating & Responding to Incidents• 5 minutes
- Custom Detections Rules• 6 minutes
- Alert Tuning & Deception• 4 minutes
- Best Practices for Microsoft Defender XDR• 4 minutes
- Data Loss Prevention (DLP) for protecting sensitive information• 6 minutes
- Aligning security solutions with MCRA for specific scenarios• 8 minutes
- Module 1- Exam Tips• 3 minutes
2 readings• Total 70 minutes
- Welcome to the Course• 40 minutes
- Microsoft Defender XDR - Overview• 30 minutes
3 assignments• Total 120 minutes
- Getting Started with Microsoft Defender XDR - Practice Assignment• 30 minutes
- Proactive Threat Detection & Incident Response - Practice Assignment• 40 minutes
- Microsoft Defender XDR - Graded Assignment• 50 minutes
This week, we will dive into advanced security configurations, endpoint protection strategies, and Defender for Endpoint (MDE) integrations with Azure Arc. You will gain insights into how Microsoft Defender XDR enhances device security, particularly for non-Azure and unmanaged devices. We begin by exploring how Azure Arc integrates with Defender for Endpoint, enabling security teams to protect and manage devices outside traditional cloud environments. You’ll also learn the process of onboarding non-Azure devices to Microsoft Defender for Endpoint (MDE) through both theoretical explanations and hands-on demonstrations. By the end of this week, you will have a deep understanding of endpoint security enhancements, enabling you to configure, monitor, and protect devices efficiently with Defender for Endpoint and Sentinel.
What's included
30 videos1 reading4 assignments
30 videos• Total 144 minutes
- Microsoft Defender for Endpoint Overview• 6 minutes
- Introduction to Azure ARC• 5 minutes
- Azure Arc and its integration with Defender for endpoints• 4 minutes
- Onboarding Non-Azure Devices to MDE• 7 minutes
- Onboarding Non-Azure Devices to MDE - Demo• 5 minutes
- Advanced Features Overview• 5 minutes
- Advance Feature - Restrict Correlation• 5 minutes
- Advanced Feature - Enable EDR in Block Mode• 5 minutes
- Advanced Feature - Hide potential duplicate device records• 5 minutes
- Advanced Feature -Allow or Block File• 4 minutes
- Advanced Feature - Custom Network Indicators• 4 minutes
- Advanced Feature - Tamper Protection• 3 minutes
- Advanced Feature - Web content filtering• 3 minutes
- Advanced Feature - Live Response• 5 minutes
- Advanced Feature - Endpoint Attack Notifications• 4 minutes
- What are Unmanaged Devices• 5 minutes
- Unmanaged Devices - Discovery Setup• 7 minutes
- Device Discovery - Exclusions• 2 minutes
- Device Discovery - Configuring Monitored Networks• 3 minutes
- Device Discovery - Authenticated Scans• 9 minutes
- Unmanaged Device Protection• 6 minutes
- Unmanaged Device Protection - Demo• 4 minutes
- Managing Remediations• 5 minutes
- Managing Remediations - Demo• 5 minutes
- Defender Vulnerability Management• 6 minutes
- Defender Vulnerability Management-Demo• 4 minutes
- Device Timeline- Demo• 4 minutes
- Live Response - Demo• 5 minutes
- Module 2 - Exam Tips• 4 minutes
- Advanced Feature - Endpoint Attack Notifications• 4 minutes
1 reading• Total 30 minutes
- Microsoft Defender for Endpoint - Overview• 30 minutes
4 assignments• Total 190 minutes
- Integrating and Enhancing Endpoint Security with Microsoft Defender and Azure Arc - Practice Assignment• 40 minutes
- Untitled• 50 minutes
- Comprehensive Management and Protection of Unmanaged Devices with Microsoft Defender - Practice Assignment• 40 minutes
- Microsoft Defender for Endpoint - Graded Assignment• 60 minutes
Welcome to Week 3 of the SC-200: Microsoft Security Operations Analyst course. This week, we will explore the powerful capabilities of Microsoft Sentinel, a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solution. Sentinel enables security teams to collect, analyze, and respond to security threats across hybrid environments using built-in connectors, automated playbooks, and advanced analytics. As we progress, you’ll be introduced to Kusto Query Language (KQL) and its role in security incident investigations, filtering logs, joining tables, and analyzing threat patterns. Through hands-on exercises, you will develop custom analytics rules, set up STIX/TAXII threat intelligence feeds, and configure automated playbooks using Logic Apps. By the end of this week, you will have the expertise to deploy, monitor, and optimize Microsoft Sentinel for proactive security analytics, ensuring efficient incident response and anomaly detection.
What's included
20 videos1 reading3 assignments
20 videos• Total 100 minutes
- What is Microsoft Sentinel?• 5 minutes
- Workspace Planning in Microsoft Sentinel• 6 minutes
- Overview of built-in connectors• 5 minutes
- Overview of built-in connectors - Demo• 5 minutes
- Content Hub - Demo• 5 minutes
- Basics of KQL syntax Overview• 6 minutes
- Key commands for filtering, joining tables• 7 minutes
- How KQL is specifically used in Sentinel• 6 minutes
- Introduction to KQL - Demo• 5 minutes
- Analytics Rules Overview• 4 minutes
- Analytics Rules - Demo• 8 minutes
- Investigating incidents, entities, and timelines - Overview• 4 minutes
- Investigating incidents, entities, and timelines - Demo• 4 minutes
- STIX/TAXII feeds• 5 minutes
- Connecting to STIX/TAXII feeds - LAB• 4 minutes
- Introduction to playbooks (Logic Apps)• 4 minutes
- Triggering playbooks based on alerts• 4 minutes
- Use cases for automated remediation tasks• 5 minutes
- Anomaly detection with built-in features• 5 minutes
- Module 3- Exam Tips• 3 minutes
1 reading• Total 30 minutes
- Microsoft Sentinel - Overview• 30 minutes
3 assignments• Total 100 minutes
- Optimizing Security Operations with Microsoft Sentinel and KQL - Practice Assignment• 30 minutes
- Incident Investigation and Automated Remediation with Microsoft Sentinel Tools - Practice Assignment• 30 minutes
- Microsoft Sentinel - Graded Assignment• 40 minutes
Welcome to Week 4 of the SC-200: Microsoft Security Operations Analyst course. This week, we will focus on Microsoft Security Exposure Management, cloud security solutions, and governance strategies within the Microsoft Defender ecosystem. We begin by exploring Security Exposure Management, understanding its role in identifying security risks, prioritizing remediation efforts, and optimizing cloud security posture. You’ll also examine the new alert suppression experience, improving incident response workflows to minimize unnecessary alerts and enhance security monitoring efficiency. Next, we will dive into Microsoft Sentinel’s data ingestion optimization, exploring how to refine log management, enhance behavior analytics, and implement best practices for proactive security insights. Throughout the week, we’ll cover essential cloud security solutions, including Microsoft Defender for Cloud, Defender for Office 365, Defender for Cloud Apps, and Defender for Cloud Workload Protection, ensuring seamless security governance and compliance across enterprise environments. By the end of the week, you will develop practical expertise in managing cloud security risks, implementing policies, and utilizing Microsoft Entra ID protection for identity threat detection. You will also gain insights into Azure Lighthouse, which enables secure management of cloud resources across multiple tenants.
What's included
16 videos1 reading2 assignments
16 videos• Total 77 minutes
- Microsoft Security Exposure Management - Overview• 4 minutes
- Microsoft Security Exposure Management - Demo• 5 minutes
- New Alert Suppression Experience - Overview• 4 minutes
- New Alert Suppression Experience - Demo• 3 minutes
- Monitor and optimize data ingestion in Microsoft Sentinel• 4 minutes
- Behavior Analytics in Microsoft Sentinel• 7 minutes
- Best Practices - Behavior Analytics• 3 minutes
- Microsoft Defender family• 6 minutes
- Microsoft Defender for Cloud• 6 minutes
- Microsoft Defender for Cloud Apps• 6 minutes
- Microsoft Defender for Office 365• 6 minutes
- Policies & Governance with Microsoft Defender for Cloud Apps• 5 minutes
- Microsoft Defender for Cloud Workload Protection• 5 minutes
- Investigating Risk with Microsoft Entra ID Protection• 5 minutes
- Purpose of Azure Lighthouse• 5 minutes
- Module 4 - Exam Tips• 4 minutes
1 reading• Total 30 minutes
- Microsoft Defender and Sentinel: Unified Security Operations and Exposure Management - Overview• 30 minutes
2 assignments• Total 90 minutes
- Comprehensive Risk Management and Advanced Threat Protection - Practice Assignment• 40 minutes
- Microsoft Defender and Sentinel: Unified Security Operations and Exposure Management - Graded Assignment• 50 minutes
This week, we will focus on proactive threat hunting techniques, leveraging Microsoft Sentinel, MITRE ATT&CK frameworks, and advanced security queries to detect and respond to sophisticated cyber threats. We begin by understanding threat hunting fundamentals and how security analysts use structured methodologies to identify potential vulnerabilities before they escalate into incidents. You will explore the MITRE ATT&CK framework, gaining insights into attacker tactics, techniques, and procedures (TTPs) to improve security detection and response strategies Next, we will dive into threat hunting queries, covering query-building principles, filtering techniques, and practical demonstrations within Microsoft Sentinel Livestream. You’ll also learn how to enhance security operations using the SOC efficiency workbook, enabling teams to streamline investigations and optimize security workflows.
What's included
12 videos1 reading2 assignments
12 videos• Total 53 minutes
- Introduction to threat Hunting• 6 minutes
- Explore MITRE ATT&CK• 5 minutes
- Explore Threat Hunting Queries• 5 minutes
- Explore Threat Hunting Queries - Demo• 7 minutes
- Microsoft Sentinel Livestream - Overview• 3 minutes
- Microsoft Sentinel Livestream - Demo• 4 minutes
- SOC efficiency workbook - Overview• 3 minutes
- SOC efficiency workbook - Demo• 4 minutes
- Hunt with a Search Job - Overview• 5 minutes
- Hunt with a Search Job - Demo• 4 minutes
- Hunt for threats using notebooks• 4 minutes
- Module 5- Exam Tips• 4 minutes
1 reading• Total 30 minutes
- Microsoft Sentinel: Threat Hunting Services - Overview• 30 minutes
2 assignments• Total 60 minutes
- Threat Hunting and Security Optimization with Microsoft Sentinel - Practice Assignment• 25 minutes
- Microsoft Sentinel: Threat Hunting Services - Graded Assignment• 35 minutes
This week, we will explore Microsoft Copilot for Security, an AI-driven security assistant designed to enhance threat detection, incident response, and security operations efficiency. You will gain insights into how Copilot leverages AI to accelerate security investigations, helping organizations identify threats, assess risks, and automate response workflows. Next, we will explore Microsoft Security Copilot's best practices, focusing on how to integrate Copilot into security workflows, manage plugins, optimize file handling, and connect security data sources using built-in connectors. You will also learn about permissions management, cost monitoring, and operational considerations for deploying Copilot in enterprise security environments. To solidify your understanding, we will conduct hands-on demos, showcasing how Copilot assists in incident analysis, threat detection, and risk investigation. By the end of this week, you’ll have a comprehensive understanding of Microsoft Copilot for Security, including its role in modern security strategies, exam preparation insights, and career pathways in AI-driven cybersecurity.
What's included
16 videos2 readings2 assignments
16 videos• Total 74 minutes
- Microsoft Copilot - Overview• 4 minutes
- Why should organizations adopt Microsoft Copilot• 4 minutes
- Microsoft Copilot - Demo• 5 minutes
- What is Microsoft Copilot for Security?• 3 minutes
- Microsoft Copilot for Security - Features and Usecases• 5 minutes
- Microsoft Security Copilot: Best Practices• 6 minutes
- Microsoft Copilot for Security - Demo• 6 minutes
- Promptbooks in Copilot for Security• 4 minutes
- Manage plugins and files in Microsoft Copilot for Security• 4 minutes
- Microsoft Copilot for Security - Connectors• 6 minutes
- Manage permissions and roles in Copilot for Security• 4 minutes
- Monitor Copilot for Security capacity and cost• 5 minutes
- Identify threats and risks by using Copilot for Security• 5 minutes
- Investigate incidents by using Copilot for Security• 6 minutes
- Module 6 - Exam Tips• 5 minutes
- Conclusion, What's Next, Job Roles, and Best Practices• 3 minutes
2 readings• Total 60 minutes
- Microsoft Security Copilot Overview• 30 minutes
- Course Summary and Key Takeaways• 30 minutes
2 assignments• Total 110 minutes
- Implement and use Microsoft Copilot for Security - Practice Assignment• 50 minutes
- Microsoft Security Copilot- Graded Assignment• 60 minutes
Instructor

Offered by

Offered by

Providing certification training since the year 2000, Whizlabs is the pioneer among online training providers across the globe. We are dedicated to helping you learn the skills you need to transform your career in the IT industry. We provide certification training in the form of Video Courses, Practice Tests, Hands-on Labs and Sandbox in various disciplines such as Cloud Computing, DevOps, Cyber Security, Java, Big Data, Snowflake, CompTIA, Agile, Linux, CCNA, Blockchain, and much more.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Information Technology

Course

Course

Course

Course