SC-200: Perform threat hunting in Microsoft Sentinel
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Explain threat hunting concepts in Microsoft Sentinel
- Describe threat hunting concepts for use with Microsoft Sentinel
- Define a threat hunting hypothesis for use in Microsoft Sentinel
- Module 2: Threat hunting with Microsoft Sentinel
- Use queries to hunt for threats.
- Save key findings with bookmarks.
- Observe threats over time with livestream.
- Module 3: Hunt for threats using notebooks in Microsoft Sentinel
- Explore API libraries for advanced threat hunting in Microsoft Sentinel
- Describe notebooks in Microsoft Sentinel
- Create and use notebooks in Microsoft Sentinel
Upon completion of this module, the learner will be able to:
In this module, you will:
Upon completion of this module, the learner will be able to:
Syllabus
- Module 1: Explain threat hunting concepts in Microsoft Sentinel
- Introduction
- Understand cybersecurity threat hunts
- Develop a hypothesis
- Knowledge check
- Summary and resources
- Module 2: Threat hunting with Microsoft Sentinel
- Introduction
- Exercise setup
- Explore creation and management of Microsoft Sentinel threat-hunting queries
- Save key findings with bookmarks
- Observe threats over time with livestream
- Exercise - Hunt for threats by using Microsoft Sentinel
- Summary
- Module 3: Hunt for threats using notebooks in Microsoft Sentinel
- Introduction
- Access Azure Sentinel data with external tools
- Hunt with notebooks
- Create a notebook
- Explore notebook code
- Knowledge check
- Summary and resources
Tags
Related Courses
Social Network AnalysisUniversity of Michigan via Coursera Intro to Algorithms
Udacity Data Analysis
Johns Hopkins University via Coursera Computing for Data Analysis
Johns Hopkins University via Coursera Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX