SC 200 Microsoft Security Operations Analyst |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
8.7 GB |
|
Total Files |
353 |
|
Last Seen |
2025-07-18 00:06 |
|
Hash |
8555CE4F9D54511A47E2BED48D4BDD56A450A257 |
/Chapter 6 Module 5 - Microsoft Sentinel Environment - Configuration/ |
|
|
85.3 MB |
|
20.5 MB |
|
20.5 MB |
|
20.3 MB |
|
20.3 MB |
|
4.3 MB |
|
4.3 MB |
|
11.9 MB |
|
11.9 MB |
|
11.7 MB |
|
11.7 MB |
|
10.7 MB |
|
10.7 MB |
|
8.5 MB |
|
8.5 MB |
|
8.1 MB |
|
8.1 MB |
|
6.6 MB |
|
6.6 MB |
|
15.3 MB |
|
15.3 MB |
|
19.6 MB |
|
19.6 MB |
|
60.5 MB |
|
60.5 MB |
|
29.6 MB |
|
29.6 MB |
|
16.2 MB |
|
16.2 MB |
|
13.3 MB |
|
13.3 MB |
|
24.0 MB |
|
24.0 MB |
017. Sentinel - Creating a Watchlist for Tor Nodes-Edited (1).mp4 |
41.0 MB |
017. Sentinel - Creating a Watchlist for Tor Nodes-Edited.mp4 |
41.0 MB |
|
85.3 MB |
|
8.8 MB |
|
8.8 MB |
020. Sentinel - Capturing Traffic from TOR Exit Nodes (1).mp4 |
40.6 MB |
|
40.6 MB |
|
40.8 MB |
|
40.8 MB |
|
24.7 MB |
|
24.7 MB |
|
9.5 MB |
|
9.5 MB |
024. Analytical Rule Types - ML-Based Behavioral Analytics (1).mp4 |
7.4 MB |
024. Analytical Rule Types - ML-Based Behavioral Analytics.mp4 |
7.4 MB |
025. Analytical Rule Types - Anomaly, Scheduled Alerts, and NRT (1).mp4 |
15.7 MB |
025. Analytical Rule Types - Anomaly, Scheduled Alerts, and NRT.mp4 |
15.7 MB |
|
12.2 MB |
|
12.2 MB |
|
36.4 MB |
|
36.4 MB |
|
21.2 MB |
|
21.2 MB |
|
43.9 MB |
|
43.9 MB |
|
29.6 MB |
|
29.6 MB |
/Chapter 1 Introduction/ |
|
002. SC-200 - Microsoft Security Operations Analyst - Course Introduction.mp4 |
19.6 MB |
003. SC-200 - Microsoft Security Operations Analyst - Recent Update.mp4 |
15.2 MB |
|
55.5 MB |
/Chapter 2 Module 1- Mitigate Threats Using Microsoft 365 Defender/ |
|
|
13.8 MB |
|
37.6 MB |
|
17.9 MB |
|
33.6 MB |
|
18.2 MB |
006. Mitigate Incidents Using Microsoft 365 Defender - Chapter Introduction.mp4 |
20.6 MB |
|
27.1 MB |
|
21.4 MB |
|
31.3 MB |
|
16.0 MB |
|
9.2 MB |
|
20.8 MB |
|
25.7 MB |
|
51.0 MB |
|
6.9 MB |
|
20.6 MB |
|
39.3 MB |
|
5.1 MB |
019. Microsoft Defender for Office 365 - Chapter Introduction.mp4 |
8.0 MB |
020. Microsoft Defender for Office 365 - Key Capabilities.mp4 |
51.5 MB |
021. Microsoft Defender for Office 365 - Key Capabilities - II.mp4 |
14.3 MB |
022. Safeguard Your Organization- M365 Defender for O365 - Lab I.mp4 |
58.1 MB |
023. Safeguard Your Organization- M365 Defender for O365 - Lab II.mp4 |
12.4 MB |
|
44.9 MB |
|
8.1 MB |
|
16.4 MB |
|
58.5 MB |
|
19.2 MB |
|
9.4 MB |
|
64.6 MB |
|
35.4 MB |
032. Microsoft Defender for Identity Sensors - Architecture.mp4 |
11.0 MB |
033. Protect Your Identities with Azure AD Identity Protection - Introduction.mp4 |
17.3 MB |
|
40.1 MB |
035. User Risk Policy and Sign-In Risk Policy - Lab Activity.mp4 |
38.1 MB |
|
8.3 MB |
|
30.9 MB |
|
67.7 MB |
|
35.5 MB |
|
3.1 MB |
|
36.5 MB |
|
30.9 MB |
|
11.7 MB |
|
28.3 MB |
|
27.7 MB |
|
12.9 MB |
|
48.4 MB |
|
48.4 MB |
|
20.1 MB |
|
20.1 MB |
|
19.2 MB |
|
19.2 MB |
|
19.7 MB |
|
19.7 MB |
|
13.9 MB |
|
13.9 MB |
/Chapter 3 Module 2 - Mitigate Threats Using Microsoft Defender for Endpoint/ |
|
|
9.5 MB |
|
9.5 MB |
|
28.7 MB |
|
28.7 MB |
|
8.7 MB |
|
8.7 MB |
|
75.7 MB |
|
75.7 MB |
005. Windows 10 Security Enhancements - Chapter Introduction (1).mp4 |
13.1 MB |
005. Windows 10 Security Enhancements - Chapter Introduction.mp4 |
13.1 MB |
|
44.1 MB |
|
44.1 MB |
|
35.5 MB |
|
35.5 MB |
|
19.1 MB |
|
19.1 MB |
|
47.3 MB |
|
47.3 MB |
|
32.6 MB |
|
32.6 MB |
|
19.5 MB |
|
19.5 MB |
|
14.4 MB |
|
14.4 MB |
|
12.0 MB |
|
12.0 MB |
|
48.6 MB |
|
48.6 MB |
|
24.5 MB |
|
24.5 MB |
|
13.8 MB |
|
13.8 MB |
|
18.4 MB |
|
18.4 MB |
018. Advance Automated Remediation Features - Endpoint (1).mp4 |
24.8 MB |
|
24.8 MB |
|
8.8 MB |
|
8.8 MB |
|
5.6 MB |
|
5.6 MB |
|
32.9 MB |
|
32.9 MB |
|
13.0 MB |
|
13.0 MB |
023. Blocking Risky Devices Using Intune, Defender, and Azure AD (1).mp4 |
49.6 MB |
023. Blocking Risky Devices Using Intune, Defender, and Azure AD.mp4 |
49.6 MB |
024. Configure Alerts and Detections - Chapter Introduction (1).mp4 |
10.0 MB |
024. Configure Alerts and Detections - Chapter Introduction.mp4 |
10.0 MB |
|
12.4 MB |
|
12.4 MB |
|
23.6 MB |
|
23.6 MB |
|
19.1 MB |
|
19.1 MB |
028. Threat and Vulnerability Management - Chapter Introduction (1).mp4 |
10.4 MB |
028. Threat and Vulnerability Management - Chapter Introduction.mp4 |
10.4 MB |
029. Threat and Vulnerability Management - Explanation (1).mp4 |
40.7 MB |
|
40.7 MB |
|
28.8 MB |
|
28.8 MB |
/Chapter 4 Module 3 - Mitigate Threats Using Microsoft Defender for Cloud/ |
|
|
3.6 MB |
|
3.6 MB |
|
8.6 MB |
|
8.6 MB |
|
30.2 MB |
|
30.2 MB |
|
66.9 MB |
|
66.9 MB |
|
5.9 MB |
|
5.9 MB |
006. Which Resources Are Protected Using Microsoft Defender (1).mp4 |
7.3 MB |
006. Which Resources Are Protected Using Microsoft Defender.mp4 |
7.3 MB |
|
68.8 MB |
|
68.8 MB |
|
51.3 MB |
|
51.3 MB |
|
14.8 MB |
|
14.8 MB |
|
40.4 MB |
|
40.4 MB |
|
27.8 MB |
|
27.8 MB |
|
12.3 MB |
|
12.3 MB |
|
15.3 MB |
|
15.3 MB |
|
25.4 MB |
|
25.4 MB |
|
17.1 MB |
|
17.1 MB |
016. Connect Azure Assets to Azure Defender- Chapter Introduction (1).mp4 |
9.2 MB |
016. Connect Azure Assets to Azure Defender- Chapter Introduction.mp4 |
9.2 MB |
|
30.5 MB |
|
30.5 MB |
|
25.0 MB |
|
25.0 MB |
|
15.2 MB |
|
15.2 MB |
|
4.4 MB |
|
4.4 MB |
|
7.5 MB |
|
7.5 MB |
|
12.6 MB |
|
12.6 MB |
|
57.9 MB |
|
57.9 MB |
|
34.4 MB |
|
34.4 MB |
025. Remediating Security Alerts- Chapter Introduction (1).mp4 |
10.4 MB |
|
10.4 MB |
|
38.0 MB |
|
38.0 MB |
|
18.4 MB |
|
18.4 MB |
|
44.5 MB |
|
44.5 MB |
|
24.0 MB |
|
24.0 MB |
|
18.1 MB |
|
18.1 MB |
|
44.7 MB |
|
44.7 MB |
|
13.6 MB |
|
13.6 MB |
|
13.0 MB |
|
13.0 MB |
|
11.3 MB |
|
11.3 MB |
|
16.1 MB |
|
16.1 MB |
/Chapter 5 Module 4 - Create Queries for Microsoft Sentinel Using Kusto Query Language/ |
|
|
3.7 MB |
|
3.7 MB |
|
5.6 MB |
|
5.6 MB |
|
21.0 MB |
|
21.0 MB |
|
27.7 MB |
|
27.7 MB |
|
40.6 MB |
|
40.6 MB |
|
22.2 MB |
|
22.2 MB |
|
22.6 MB |
|
22.6 MB |
|
40.4 MB |
|
40.4 MB |
|
44.7 MB |
|
44.7 MB |
|
17.1 MB |
|
17.1 MB |
|
19.8 MB |
|
19.8 MB |
|
39.5 MB |
|
39.5 MB |
|
25.3 MB |
|
25.3 MB |
|
14.4 MB |
|
14.4 MB |
|
7.5 MB |
|
7.5 MB |
/Chapter 7 Module 6 - Microsoft Sentinel Environment - Connecting Logs/ |
|
|
2.3 MB |
|
2.3 MB |
|
13.5 MB |
|
13.5 MB |
|
11.9 MB |
|
11.9 MB |
|
10.9 MB |
|
10.9 MB |
005. Azure Active Directory Identity Protection Connector (1).mp4 |
13.6 MB |
005. Azure Active Directory Identity Protection Connector.mp4 |
13.6 MB |
|
14.2 MB |
|
14.2 MB |
|
22.7 MB |
|
22.7 MB |
008. Connect Threat Indicators to Microsoft Sentinel (1).mp4 |
35.8 MB |
|
35.8 MB |
/Chapter 8 Module 7 - Microsoft Sentinel Environment - Incidents, Threat Response, UEBA, and Monitoring/ |
|
|
1.8 MB |
|
1.8 MB |
|
12.8 MB |
|
12.8 MB |
|
27.8 MB |
|
27.8 MB |
|
32.6 MB |
|
32.6 MB |
|
23.1 MB |
|
23.1 MB |
|
22.7 MB |
|
22.7 MB |
007. Brute Force Attack against Azure Portal - Simulation (1).mp4 |
14.9 MB |
007. Brute Force Attack against Azure Portal - Simulation.mp4 |
14.9 MB |
008. Threat Response with Microsoft Sentinel Playbooks - Intr (1).mp4 |
31.2 MB |
008. Threat Response with Microsoft Sentinel Playbooks - Introduc.mp4 |
31.2 MB |
009. Step 1 - Creating Analytical Rule to Look for Role Membe (1).mp4 |
29.5 MB |
009. Step 1 - Creating Analytical Rule to Look for Role Membershi.mp4 |
29.5 MB |
010. Step 2 - Integrate Log Analytics with Azure AD Audit Log (1).mp4 |
20.7 MB |
010. Step 2 - Integrate Log Analytics with Azure AD Audit Logs.mp4 |
20.7 MB |
|
13.7 MB |
|
13.7 MB |
|
19.7 MB |
|
19.7 MB |
013. Step 5 - Create Logic App to Integrate with Microsoft Te (1).mp4 |
50.9 MB |
013. Step 5 - Create Logic App to Integrate with Microsoft Teams.mp4 |
50.9 MB |
014. Step 6 - Edit Analytical Rule to Add Logic App - Playboo (1).mp4 |
9.1 MB |
014. Step 6 - Edit Analytical Rule to Add Logic App - Playbooks.mp4 |
9.1 MB |
|
17.3 MB |
|
17.3 MB |
016. UEBA - User Entity Behavior Analytics - Introduction (1).mp4 |
64.3 MB |
016. UEBA - User Entity Behavior Analytics - Introduction.mp4 |
64.3 MB |
|
19.7 MB |
|
19.7 MB |
|
22.9 MB |
|
22.9 MB |
|
15.3 MB |
|
15.3 MB |
|
47.7 MB |
|
47.7 MB |
|
32.9 MB |
|
32.9 MB |
/Chapter 9 Module 8 - Perform Threat Hunting with Microsoft Sentinel/ |
|
|
2.5 MB |
|
2.5 MB |
|
45.9 MB |
|
45.9 MB |
|
31.7 MB |
|
31.7 MB |
|
53.1 MB |
|
53.1 MB |
|
37.8 MB |
|
37.8 MB |
|
16.0 MB |
|
16.0 MB |
|
48.0 MB |
|
48.0 MB |
/Chapter 10 SC 200 - Microsoft Security Operations Analyst - Course Summary/ |
|
001. Microsoft Security Operations Analyst - Course Summary (1).mp4 |
27.3 MB |
001. Microsoft Security Operations Analyst - Course Summary.mp4 |
27.3 MB |
Total files 353 |
Copyright © 2025 FileMood.com