SC-200: Manage a Security Operations Environment
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to manage a security operations environment using Microsoft XDR in preparation for the SC-200 exam.
The ever-evolving cyber threat landscape demands that organizations prioritize the strategic management of their Security Operations Environment. In this course, SC-200: Manage a Security Operations Environment, you’ll learn how to effectively manage a Microsoft Security Operations Environment comprising Microsoft XDR. First, you’ll explore how to master the defender XDR Configuration. Next, you’ll discover how to take control of your assets and environment by configuring Microsoft XDR and its components. Finally, you’ll learn how to streamline your security operations with Microsoft Sentinel. When you’re finished with this course, you’ll have the skills and knowledge of managing a security operations environment needed for the SC-200 exam.
The ever-evolving cyber threat landscape demands that organizations prioritize the strategic management of their Security Operations Environment. In this course, SC-200: Manage a Security Operations Environment, you’ll learn how to effectively manage a Microsoft Security Operations Environment comprising Microsoft XDR. First, you’ll explore how to master the defender XDR Configuration. Next, you’ll discover how to take control of your assets and environment by configuring Microsoft XDR and its components. Finally, you’ll learn how to streamline your security operations with Microsoft Sentinel. When you’re finished with this course, you’ll have the skills and knowledge of managing a security operations environment needed for the SC-200 exam.
Syllabus
- Course Overview 1min
- Mastering Defender XDR Configuration 44mins
- Take Control of Your Assets and Environments 31mins
- Streamline Your Security Operations with Sentinel 31mins
- Domain Summary 3mins
Taught by
Rishalin Pillay
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network