
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
By :

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
By:
Overview of this book
Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.
Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.
By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.
Table of Contents (19 chapters)
Preface
Section 1 – Exam Overview and Evolution of Security Operations
Chapter 1: Preparing for Your Microsoft Exam and SC-200 Objectives
Chapter 2: The Evolution of Security and Security Operations
Section 2 – Implementing Microsoft 365 Defender Solutions
Chapter 3: Implementing Microsoft Defender for Endpoint
Chapter 4: Implementing Microsoft Defender for Identity
Chapter 5: Understanding and Implementing Microsoft Defender for Cloud (Microsoft Defender for Cloud Standard Tier)
Section 3 – Familiarizing Yourself with Alerts, Incidents, Evidence, and Dashboards
Chapter 6: An Overview: Microsoft Defender for Endpoint Alerts, Incidents, Evidence, and Dashboards
Chapter 7: Microsoft Defender for Identity, What Happened, Alerts, and Incidents
Chapter 8: Microsoft Defender for Office – Threats to Productivity
Chapter 9: Microsoft Defender for Cloud Apps and Protecting Your Cloud Apps
Section 4 – Setting Up and Connecting Data Sources to Microsoft Sentinel
Chapter 10: Setting Up and Configuring Microsoft Sentinel
Section 5 – Hunting Threats within Microsoft 365 Defender and Microsoft Sentinel
Chapter 11: Advanced Threat Hunting, Microsoft 365 Defender Portal, and Sentinel
Chapter 12: Knowledge Check
Other Books You May Enjoy
How would like to rate this book
Customer Reviews