Skip to main content
Rlearning solution private limited
Rlearning solution private limited
  • SC-200: Microsoft Security Operations Analyst    

    Course Overview :

    The 5-Day Instructor-Led training on Microsoft security operations analyst to investigate, respond and to hunt for threats using Microsoft defender XDR, Microsoft Defender for Cloud. This Course will Give the In-Depth knowledge to Perform detection, Analysis and Reporting which helps to Reduce Organizational Risk by rapidly remediating active attacks in the environment.

    In this course participants will learn how Microsoft Defender XDR Suites and Microsoft Defender for Cloud with Sentinel

    The course will be delivered using the use-cases and Real-world examples this will help participants to learn concepts to Detect, Investigate, respond, Hunt and report to reduce the threats and Attacks.

     

    The training also prepares to write exam on SC-100

Key Features of this course

Dedicated Lab Access

All the participants will get dedicated lab access to do the hands on practice 

Practice Questions

All the participants will get access to Unique exam portal Access which will Prepare you for Certification as well the Knowledge check 

Daily Key Notes

Daily notes will be shared to everyone which is help to follow session and useful for the future reference

Microsoft Achievement code

All the paticipants will get the completion achievement code which is provided by Microsoft

This Course Deeply Covers Below 

  • Top Security threats 
  • Principles to detect, Investigate, respond and Report 
  • Architecture of the Microsoft 365 Security Services 
  • Microsoft defender for Microsoft 365 

  • Microsoft defender for Endpoint 
  • Microsoft defender for Cloud  
  • Microsoft Defender For Entra ID 
  • Microsoft Defender for Identity 
  • Sentinel

New Batch Starts @ 21-DEC-2024
​Batch Type : Weekend 
​Timing : 2:00 PM IST to 6:00 PM IST

​Offer Price : 14750/- Incl All taxes (This price applicable the candidates who rigister before 07-DEC-2024

Register Now

Course Curriculum

Talk to our Advisor

Module 1: Zero Trust and best Practice Frameworks

Lessons:

  • Common Cyberthreats and attack patterns
  • Zero-Trust Security Principles, MCRA and MCSB to fix the Cyberthreats and Attacks
  • Understanding Security Components, Controls and Features to protect On-premises, Cloud Infrastructure (Azure, Microsoft 365 and Multicloud)
  •  Design Resiliency strategy for cyberattacks using Microsoft security best practices
Module 2: Design Identity Security and Compliance capabilities

Lessons:

  • Design Security Controls for Credential Stealing and Credential Sharing
  • Design Security Controls for Identity Risk
  • Design privileged Access Model
  • Design Cloud Infrastructure Entitlement
  • Design Privileged Access Workstations and Bastions
  • Design Security for Active Directory Domain Services from common directory service attack
  • Design Solutions manage secrets, keys and certificates
  •  Design Modern authentication and Authorization strategies

 Lab :

  • Protect password stealing and password sharing
  • Apply Conditional Access
  • Preventing the user and sign-in risks
  • Apply privileged Access (Just in time) for Identity
  • Securing Secrets, keys, certificates using vault 
Module 3: Design security for Infrastructure and Applications

Lessons:

 

  • Design Security Solutions for Network segmentations
  • Design Solutions for Network security Posture management
  • Design Security Solutions for Servers, Virtual Machines, App Services, Containers
  • Design Security Solution for Web applications attack
  • Design Security Solution for Protecting Entire network infrastructure from DDOS Attack

 

Lab :

  • Design and Implement Azure Firewall Appliance
  • Design and Implement Traffic Filtering for Servers, Virtual Machines and Subnets
  • Design and Implement Web Application Firewall
  • Design and Implement DDOS Protection Service
  • Design and Implement Bastion Host Services
  • Design and Implement Just in Time access 
Module 4: Design Security Storage and Organization’s data

Lessons:

  • Design Security for Servers and Virtual Machines Disk 
  • Design Security for Storage Services (Blob, Table, Queue and files)
  • Design Security for API and Databases
  • Design Security for data in transit 

Labs:

  • Apply Encryption for Data At rest
  • Apply Encryption for Data in transit
  • Apply Firewall, Keys, certificates for API and Databases 
Module 5:Design Security for Microsoft 365

Lessons:

  • Security Architecture of Microsoft 365 Services (Exchange, SharePoint, Teams and Other Applications)
  • Design Microsoft XDR and Purview Solution to Secure and Maintain Compliance of Microsoft 365 Services (Exchange, SharePoint, Teams)
  • Implement Security for Operational Practices of Microsoft 365
  • Design security Control for Microsoft 365 Co-Pilot Services 

Lab:

  • Apply Threat and Security Policies for Microsoft 365 Services
  • Apply Rights to Access the Sensitive data in Microsoft 365 Services
  • Apply Policies to Prevent Data loss
  • Apply Policies for Secured Communication using Microsoft 365 Services 
Module 6: Design Security for Endpoint Devices

Lessons:

 

  • Design Security Architecture for End Point Devices
  • Design Security baseline for End Point Devices
  • Evaluate the compliance of Endpoint Devices
  • Design Security solutions for Secure Remote access
  • Design Endpoint devices security updates 
Lab :'
  • Apply Endpoint Firewall
  • Apply EndpointEncryption
  • Apply Endpoint Antivirus and Malware Solution
  • Apply Endpoint Attack Surface Reduction policy
  • Apply Account Protection Policy
  • Apply Endpoint Compliance Policy
  • Apply Endpoint Baseline Policy


Module 7:Design Security Information and Event Management

Lessons:

  • Design to Evaluate Security posture Of Cloud and On-premises Infrastructure
  • Design to Monitor the Incidents and alerts of security threats
  • Design to automatic Investigation and Response AIR
  • Design to Hunt the threats in the Entire Infrastructure
  • Design to Evaluate Security Score
  • Design to audit the Logs and Reports