Microsoft
Microsoft Logo

SC-200: Mitigate threats using Microsoft 365 Defender 

  • Offered byMicrosoft

SC-200: Mitigate threats using Microsoft 365 Defender
 at 
Microsoft 
Overview

Learn how to use the Microsoft 365 Defender integrated threat protection suite

Duration

7 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

SC-200: Mitigate threats using Microsoft 365 Defender
 at 
Microsoft 
Course details

Skills you will learn
What are the course deliverables?
  • Learn how the Microsoft 365 Defender portal provides a unified view of incidents from the Microsoft 365 Defender family of products
  • Use the advanced detection and remediation of identity-based threats to protect your Azure Active Directory identities and applications from compromise
  • Learn about the Microsoft Defender for Office 365 component of Microsoft 365 Defender
  • Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender
  • Learn how to use Defender for Cloud Apps in your organization
  • Learn how the data loss prevention alerts will help in your investigation to find the full scope of the incident
More about this course
  • Analyze threat data across domains and rapidly remediate threats with built-in orchestration and automation in Microsoft 365 Defender
  • This learning path aligns with exam SC-200: Microsoft Security Operations Analyst

SC-200: Mitigate threats using Microsoft 365 Defender
 at 
Microsoft 
Curriculum

Introduction to Microsoft 365 threat protection

Introduction

Explore Extended Detection & Response (XDR) response use cases

Understand Microsoft 365 Defender in a Security Operations Center (SOC)

Investigate security incident in Microsoft 365 Defender

Knowledge check

Summary and resources

Mitigate incidents using Microsoft 365 Defender

Introduction

Use the Microsoft 365 Defender portal

Manage incidents

Investigate incidents

Manage and investigate alerts

Manage automated investigations

Use the action center

Explore advanced hunting

Investigate Azure AD sign-in logs

Understand Microsoft Secure Score

Analyze threat analytics

Analyze reports

Configure the Microsoft 365 Defender portal

Knowledge check

Summary and resources

Protect your identities with Azure AD Identity Protection

Introduction

Azure AD Identity Protection overview

Detect risks with Azure AD Identity Protection policies

Investigate and remediate risks detected by Azure AD Identity Protection

Summary

Remediate risks with Microsoft Defender for Office 365

Introduction to Microsoft Defender for Office 365

Automate, investigate, and remediate

Configure, protect, and detect

Simulate attacks

Summary and knowledge check

Safeguard your environment with Microsoft Defender for Identity

Introduction to Microsoft Defender for Identity

Configure Microsoft Defender for Identity sensors

Review compromised accounts or data

Integrate with other Microsoft tools

Summary and knowledge check

Secure your cloud apps and services with Microsoft Defender for Cloud Apps

Introduction

Understand the Defender for Cloud Apps Framework

Explore your cloud apps with Cloud Discovery

Protect your data and apps with Conditional Access App Control

Walk through discovery and access control with Microsoft Defender for Cloud Apps

Classify and protect sensitive information

Detect Threats

Knowledge check

Summary

Respond to data loss prevention alerts using Microsoft 365

Introduction

Describe data loss prevention alerts

Investigate data loss prevention alerts in Microsoft Purview

Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps

Knowledge check

Summary and resources

Manage insider risk in Microsoft Purview

Insider risk management overview

Introduction to managing insider risk policies

Create and manage insider risk policies

Knowledge check

Investigate insider risk alerts

Take action on insider risk alerts through cases

Summary and knowledge check

SC-200: Mitigate threats using Microsoft 365 Defender
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
1 hours
Beginner
Free
4 hours
Intermediate
Free
5 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

SC-200: Mitigate threats using Microsoft 365 Defender
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...