MSEC-2 - MOC SC-200T00 - MICROSOFT SECURITY OPERATIONS ANALYST

INFORMAZIONI SUL CORSO

durata

Durata:

4 GIORNI
categoria

Categoria:

MS Security
qualifica

Qualifica istruttore:

Microsoft Certified Trainer
dedicato a

Dedicato a:

Professionista IT
produttore

Produttore:

Microsoft

SCEGLI LA SEDE PER QUESTO CORSO

CORSO A CALENDARIO

Per vedere le informazioni relative al calendario del corso scegli prima una sede
sede
Sede: PCSNET Roma
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Milano
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET NordEst
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Torino
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Emilia Romagna
prezzo
Prezzo: 1.750 € + IVA
Inizio
Fine
Prezzo
 
27 lug 21
30 lug 21
1.750 €
sede
Sede: PCSNET Toscana
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Marche
prezzo
Prezzo: 1.490 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNet Umbria
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Napoli
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Puglia
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!
sede
Sede: PCSNET Sicilia
prezzo
Prezzo: 1.750 € + IVA
Questo corso attualmente non ha date a Calendario e può essere erogato in forma dedicata.
Usa il box qui accanto per richiederne uno apposta per te!

CORSO DEDICATO

Per avere informazioni sul corso dedicato compila il form e ti contatteremo

CORSO DEDICATO

Grazie per la tua richiesta, ti contatteremo al più presto.

OBIETTIVI

  • Explain how Microsoft Defender for Endpoint can remediate risks in your environment
  • Create a Microsoft Defender for Endpoint environment
  • Configure Attack Surface Reduction rules on Windows 10 devices
  • Perform actions on a device using Microsoft Defender for Endpoint
  • Investigate domains and IP addresses in Microsoft Defender for Endpoint
  • Investigate user accounts in Microsoft Defender for Endpoint
  • Configure alert settings in Microsoft Defender for Endpoint
  • Explain how the threat landscape is evolving
  • Conduct advanced hunting in Microsoft 365 Defender
  • Manage incidents in Microsoft 365 Defender
  • Explain how Microsoft Defender for Identity can remediate risks in your environment.
  • Investigate DLP alerts in Microsoft Cloud App Security
  • Explain the types of actions you can take on an insider risk management case.
  • Configure auto-provisioning in Azure Defender
  • Remediate alerts in Azure Defender
  • Construct KQL statements
  • Filter searches based on event time, severity, domain, and other relevant data using KQL
  • Extract data from unstructured string fields using KQL
  • Manage an Azure Sentinel workspace
  • Use KQL to access the watchlist in Azure Sentinel
  • Manage threat indicators in Azure Sentinel
  • Explain the Common Event Format and Syslog connector differences in Azure Sentinel
  • Connect Azure Windows Virtual Machines to Azure Sentinel
  • Configure Log Analytics agent to collect Sysmon events
  • Create new analytics rules and queries using the analytics rule wizard
  • Create a playbook to automate an incident response
  • Use queries to hunt for threats
  • Observe threats over time with livestream

 

PREREQUISITI

  • Basic understanding of Microsoft 365
  • Fundamental understanding of Microsoft security, compliance, and identity products
  • Intermediate understanding of Windows 10
  • Familiarity with Azure services, specifically Azure SQL Database and Azure Storage
  • Familiarity with Azure virtual machines and virtual networking
  • Basic understanding of scripting concepts.

 

CONTENUTI:

Module 1: Mitigate threats using Microsoft Defender for Endpoint

  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Implement Windows 10 security enhancements with Microsoft Defender for Endpoint
  • Manage alerts and incidents in Microsoft Defender for Endpoint
  • Perform device investigations in Microsoft Defender for Endpoint
  • Perform actions on a device using Microsoft Defender for Endpoint
  • Perform evidence and entities investigations using Microsoft Defender for Endpoint
  • Configure and manage automation using Microsoft Defender for Endpoint
  • Configure for alerts and detections in Microsoft Defender for Endpoint
  • Utilize Threat and Vulnerability Management in Microsoft Defender for Endpoint

 

Lab : Mitigate threats using Microsoft Defender for Endpoint

  • Deploy Microsoft Defender for Endpoint
  • Mitigate Attacks using Defender for Endpoint

 

Module 2: Mitigate threats using Microsoft 365 Defender

  • Introduction to threat protection with Microsoft 365
  • Mitigate incidents using Microsoft 365 Defender
  • Protect your identities with Azure AD Identity Protection
  • Remediate risks with Microsoft Defender for Office 365
  • Safeguard your environment with Microsoft Defender for Identity
  • Secure your cloud apps and services with Microsoft Cloud App Security
  • Respond to data loss prevention alerts using Microsoft 365
  • Manage insider risk in Microsoft 365

 

Lab : Mitigate threats using Microsoft 365 Defender

  • Mitigate Attacks with Microsoft 365 Defender

 

Module 3: Mitigate threats using Azure Defender

  • Plan for cloud workload protections using Azure Defender
  • Explain cloud workload protections in Azure Defender
  • Connect Azure assets to Azure Defender
  • Connect non-Azure resources to Azure Defender
  • Remediate security alerts using Azure Defender

 

Lab : Mitigate threats using Azure Defender

  • Deploy Azure Defender
  • Mitigate Attacks with Azure Defender

 

Module 4: Create queries for Azure Sentinel using Kusto Query Language (KQL)

  • Construct KQL statements for Azure Sentinel
  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with data in Azure Sentinel using Kusto Query Language

 

Lab : Create queries for Azure Sentinel using Kusto Query Language (KQL)

  • Construct Basic KQL Statements
  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with string data using KQL statements

 

Module 5: Configure your Azure Sentinel environment

  • Introduction to Azure Sentinel
  • Create and manage Azure Sentinel workspaces
  • Query logs in Azure Sentinel
  • Use watchlists in Azure Sentinel
  • Utilize threat intelligence in Azure Sentinel

 

Lab : Configure your Azure Sentinel environment

  • Create an Azure Sentinel Workspace
  • Create a Watchlist
  • Create a Threat Indicator

 

Module 6: Connect logs to Azure Sentinel

  • Connect data to Azure Sentinel using data connectors
  • Connect Microsoft services to Azure Sentinel
  • Connect Microsoft 365 Defender to Azure Sentinel
  • Connect Windows hosts to Azure Sentinel
  • Connect Common Event Format logs to Azure Sentinel
  • Connect syslog data sources to Azure Sentinel
  • Connect threat indicators to Azure Sentinel

 

Lab : Connect logs to Azure Sentinel

  • Connect Microsoft services to Azure Sentinel
  • Connect Windows hosts to Azure Sentinel
  • Connect Linux hosts to Azure Sentinel
  • Connect Threat intelligence to Azure Sentinel

 

Module 7: Create detections and perform investigations using Azure Sentinel

  • Threat detection with Azure Sentinel analytics
  • Threat response with Azure Sentinel playbooks
  • Security incident management in Azure Sentinel
  • Use entity behavior analytics in Azure Sentinel
  • Query, visualize, and monitor data in Azure Sentinel

 

Lab : Create detections and perform investigations using Azure Sentinel

  • Create Analytical Rules
  • Model Attacks to Define Rule Logic
  • Mitigate Attacks using Azure Sentinel
  • Create Workbooks in Azure Sentinel

 

Module 8: Perform threat hunting in Azure Sentinel

  • Threat hunting with Azure Sentinel
  • Hunt for threats using notebooks in Azure Sentinel

 

Lab : Threat hunting in Azure Sentinel

  • Threat Hunting in Azure Sentinel
  • Threat Hunting using Notebooks

 

INFO

  • Esame: SC-200 - Microsoft Security Operations Analyst
  • Manuale: Materiale didattico ufficiale Microsoft in formato digitale
  • Prezzo manuale: 210 € incluso nel prezzo del corso a Calendario
  • Natura del corso: Operativo (previsti lab su PC)

PARTNERSHIP