Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Certified Security Operations Analyst Associate SC200
New section
Sc-200 part 1 sc 200 Introduction (16:11)
sc-200 part 2 sc 200 Introduction (8:37)
sc-200 part 3 sc 200 Lab (7:50)
sc-200 part 04 Introduction to Threat Hunting (7:04)
sc-200 part 5 The Microsoft 365 Defender suits (2:54)
sc-200 part 06 Timeline of Attacks (7:49)
sc-200 part 7 Security Operations (3:09)
sc-200 part 8 Microsoft Defender XDR Lab Set up (3:15)
sc-200 part 9 Microsoft 365 Defender Part-I (3:46)
sc200 part 10 Microsoft 365 Defender Part-2 (20:01)
sc-200 part 11 Microsoft Defender MITRE ATT&CK (8:19)
sc-200 part 12 Microsoft Defender Hunting (2:18)
sc-200 part 13 Microsoft Defender Advanced Hunting Part-I (4:19)
sc-200 part 14 Microsoft Defender Advanced Hunting Part-2 (7:43)
sc-200 part 15 Microsoft Threat Experts (2:17)
sc-200 part 16 Remediate user Risks using M365 Defender for 0365 (6:00)
sc-200 part 17 Microsoft Defender O365 Part-1 (3:30)
sc-200 part 18 Microsoft Defender O365 Part-2 (12:30)
sc-200 part 19 Microsoft Defender O365 Part-3 (3:43)
sc-200 part 20 Microsoft Defender O365 Part-4 (9:00)
sc-200 part 21 Microsoft Defender for Identity (1:05)
sc-200 part 22 Microsoft Defender for Identity (3:27)
sc-200 part 23 Key Capabilities Microsoft Defender for Identity- (13:12)
sc-200 part 24. Microsoft Defender for Identity Sensor (4:29)
sc-200 part 25 Microsoft Azure Virtual Machine (3:48)
sc-200 part 26 Azure ATP Sensor Setup (1:31)
sc-200 part 27 Microsoft Defender for Identity (Part - 1) (1:42)
sc-200 part 28 Microsoft Defender for Identity (Part - 2) (2:21)
sc-200 part 29 Microsoft Defender for Identity (Part - 3) (6:38)
sc-200 part 30 Azure ATP Architecture (2:20)
sc-200 part 31 Entra ID Identity Protection Part-1 (2:09)
sc-200 part 32 Entra ID Identity Protection Part-2 (4:33)
sc-200 part 33 Entra ID Identity Protection Part-3 (9:59)
sc-200 part 34 Microsoft Cloud App Security (5:42)
SC-200 part 35 Conditional Access App Control (6:40)
SC-200 part 36 Information Protection (3:53)
sc-200 part 37 Insider Risk Managemnet (1:27)
sc-200 part 38 Phases of Cloud App Security (3:28)
sc-200 part 39 SOC Analyst (4:21)
sc-200 part 40 Data Loss Prevention (6:56)
sc-200 part 41 Insider Risk Management M365 Part-1 (7:54)
sc-200 part 42 Insider Risk Management M365 Part-2 (8:50)
sc-200 part 43 Mitigating threats using Microsoft 365 defender for endpoint (1:18)
sc-200 part 44 Defender for Endpoints Features (2:50)
sc-200 part 45 Terminology of Microsoft Defender (2:19)
sc-200 part 46 Microsoft Azure Service (5:57)
sc-200 part 47 Microsoft Azure Resources (1:59)
sc-200 part 48 Microsoft Defender Device Inventory (4:49)
sc-200 part 49 Microsoft Defender Virtual Machine (4:45)
sc-200 part 50 EDR Block Mode (1:23)
sc-200 part 51 EDR in Block mode Part-2 (2:29)
sc-200 part 52 Attack Surface Reduction Part-I (4:03)
sc-200 part 53 Attack Surface Reduction Part-2 (9:23)
sc-200 part 54 Windows Defender ATP Onboarding Package Installation (1:27)
sc-200 part 55 Windows PowerShell ISE (2:26)
sc-200 part 56 Microsoft Defender Incidents (3:17)
sc-200 part 57 Microsoft Defender Device Inventory (5:25)
sc-200 part 58 Microsoft Defender Device Inventory Part-2 (1:57)
sc-200 part 59 Microsoft Defender Incidents (2:54)
sc-200 part 60 Microsoft Defender Endpoints (4:56)
sc-200 part 61 Suspicious Process Injection Observed (5:28)
sc-200 part 62 Enpoints (3:57)
sc-200 part 63 Email in Enpoint (2:50)
sc-200 part 64 Microsoft 365 Access (5:27)
sc-200 part 65 Threat & Vulnerability Management (5:48)
sc-200 part 47 Microsoft Azure Resources
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock