Course Information
Course Overview
Learn Sentinel, Defender XDR, and Defender for Cloud with real SOC workflows, KQL hunting, and exam-focused insights.
This course prepares you to earn the Microsoft Security Operations Analyst (SC-200) certification with a practical approach.
You’ll map every module to the latest skills measured for the exam, including managing a security operations environment, configuring protections and detections, managing incident response, and managing security threats. These are the same four domains Microsoft lists for SC-200, and they guide the structure, labs, and review checkpoints throughout the course.
Across the modules, you’ll work directly with the Microsoft security stack you’re tested on: Microsoft Defender XDR (covering Defender for Endpoint, Identity, and Office 365), Microsoft Defender for Cloud for cloud workload protection, and Microsoft Sentinel for SIEM/SOAR. You’ll also practice KQL-based threat hunting, incident triage, automation rules, and playbooks so you can respond with confidence on exam day and in real SOC work.
What you’ll learn:
How modern SOCs evolve from traditional tooling to unified Defender XDR and Sentinel, with hands-on configuration, tuning, and alert workflows.
Endpoint detection and response with Defender for Endpoint: onboarding, advanced features (EDR in block mode, live response), device timelines, and automated investigation.
Identity and email defenses with Defender for Identity and Defender for Office 365, including policies, DLP signals, and incident investigation in the Microsoft Defender portal.
Cloud posture and workload protection with Defender for Cloud, from discovering unprotected resources to mitigating risks surfaced by vulnerability and exposure management.
Microsoft Sentinel deployment and operations: workspace design, data collection rules, Content Hub solutions, analytics rules, workbooks, automation rules, and playbooks.
Targeted threat hunting with KQL in both Defender and Sentinel, plus mapping to MITRE ATT&CK to prioritize coverage.
The course also introduces Microsoft Security Copilot in the context of SC-200 objectives, including promptbooks, connectors, and usage considerations, reflecting Microsoft’s recent updates to the exam guidance.
By the end, you’ll have a strong command of the tools and workflows a Security Operations Analyst uses daily, and your study time will align tightly with the exam blueprint and its relative weightings: Manage a security operations environment (20–25%), Configure protections and detections (15–20%), Manage incident response (25–30%), and Manage security threats (15–20%).
Designed for analysts, sysadmins pivoting into security, and cloud pros who need SOC depth, this course focuses on real-world investigation and remediation workflows while staying faithful to the SC-200 exam’s official scope.
Course Content
- 12 section(s)
- 64 lecture(s)
- Section 1 SC-200 Overview: Role, Objectives, and Exam Readiness
- Section 2 Evolving SOC: From Traditional Security to Microsoft 365 Defender
- Section 3 SOC Operations: Identity, Endpoints, and Incident Handling
- Section 4 Network Protocols, Ports, and Troubleshooting for SC-200
- Section 5 Securing Cloud Workloads with Microsoft Defender for Cloud
- Section 6 Defender for Endpoint: Setup, Navigation, and Incident Response
- Section 7 Microsoft Defender for Identity: Alerts, Investigation, and Setup
- Section 8 Defender for Office 365: Policies, DLP, and Threat Response
- Section 9 Securing SaaS with Microsoft Defender for Cloud Apps
- Section 10 Deploying Microsoft Sentinel: From Prereqs to Data Onboarding
- Section 11 Advanced Threat Hunting with Defender, Sentinel, and Case Study
- Section 12 Defender and Sentinel: Setup, Deployment, and Operations
What You’ll Learn
- Deploy Microsoft Sentinel: connect data sources, build analytics, automate SOAR playbooks., Master KQL for threat hunting, investigation, and detection tuning in Sentinel., Operate Microsoft Defender XDR to triage correlated incidents across endpoints, identity, email, apps., Harden cloud workloads with Microsoft Defender for Cloud using CSPM and CWPP best practices., Protect Microsoft 365 with Defender for Office 365 policies, Safe Links/Attachments, and response., Design SOC workflows for triage, investigation, containment, and post-incident improvements aligned to SC-200.
Skills covered in this course
Reviews
-
PPhoebe Davies
Up-to-date, well structured, and honestly the best SC-200 prep course I’ve done.
-
LLucas Barbosa
Loved the Defender for Identity part, especially the alerts and signals breakdown.
-
MMariana Lima
Everything mapped perfectly to Microsoft’s blueprint. Helped me pass on first try.
-
RRafael Souza
Nice coverage of hunting queries and workbook design. Really enjoyed that part.