Mitigate Threats Using Microsoft Sentinel
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to enable, configure, and monitor both cloud and non-cloud platforms using Microsoft Sentinel needed for the Microsoft Security Operations Analyst (SC-200).
Do you need to prepare for the Microsoft Security Operations Analyst exam? In this course, Mitigate Threats Using Microsoft Sentinel, you’ll learn how to enable, configure, and monitor both cloud and non-cloud platforms using Microsoft Sentinel. First, you’ll see how to configure Microsoft Sentinel while identifying necessary data collections. Next, you’ll discover how to manage and respond to incidents. Finally, you’ll learn how to hunt for and remediate threats. When you’re finished with this course, you’ll have the skills and knowledge of mitigating threats using Microsoft Sentinel needed for the Microsoft Security Operations Analyst (SC-200).
Do you need to prepare for the Microsoft Security Operations Analyst exam? In this course, Mitigate Threats Using Microsoft Sentinel, you’ll learn how to enable, configure, and monitor both cloud and non-cloud platforms using Microsoft Sentinel. First, you’ll see how to configure Microsoft Sentinel while identifying necessary data collections. Next, you’ll discover how to manage and respond to incidents. Finally, you’ll learn how to hunt for and remediate threats. When you’re finished with this course, you’ll have the skills and knowledge of mitigating threats using Microsoft Sentinel needed for the Microsoft Security Operations Analyst (SC-200).
Syllabus
- Overview 1min
- Design and Configure a Microsoft Sentinel Workspace 16mins
- Implement the Use of Data Connectors in Microsoft Sentinel 16mins
- Manage Microsoft Sentinel Analytics Rules 15mins
- Manage Microsoft Sentinel Incidents 15mins
- Use Microsoft Sentinel Workbooks to Analyze and Interpret Data 9mins
- Hunt for Threats Using the Microsoft Sentinel Portal 18mins
- Configure SOAR in Microsoft Sentinel 14mins
- Domain Summary 3mins
Taught by
Michael Teske
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network