FileMood

Download SC-200-Microsoft-Security-Operations-Analyst

SC 200 Microsoft Security Operations Analyst

Name

SC-200-Microsoft-Security-Operations-Analyst

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

8.7 GB

Total Files

353

Last Seen

2025-07-18 00:06

Hash

8555CE4F9D54511A47E2BED48D4BDD56A450A257

/Chapter 6 Module 5 - Microsoft Sentinel Environment - Configuration/

018. Sentinel - Create Hunting Query (1).mp4

85.3 MB

001. What Is a SIEM Solution (1).mp4

20.5 MB

001. What Is a SIEM Solution.mp4

20.5 MB

002. What Is Microsoft Sentinel (1).mp4

20.3 MB

002. What Is Microsoft Sentinel.mp4

20.3 MB

003. Microsoft Sentinel - Components (1).mp4

4.3 MB

003. Microsoft Sentinel - Components.mp4

4.3 MB

004. Data Connectors (1).mp4

11.9 MB

004. Data Connectors.mp4

11.9 MB

005. Log Retention (1).mp4

11.7 MB

005. Log Retention.mp4

11.7 MB

006. Workbooks (1).mp4

10.7 MB

006. Workbooks.mp4

10.7 MB

007. Analytics Alerts (1).mp4

8.5 MB

007. Analytics Alerts.mp4

8.5 MB

008. Threat Hunting (1).mp4

8.1 MB

008. Threat Hunting.mp4

8.1 MB

009. Incidents and Investigations (1).mp4

6.6 MB

009. Incidents and Investigations.mp4

6.6 MB

010. Automation Playbooks (1).mp4

15.3 MB

010. Automation Playbooks.mp4

15.3 MB

011. Creating Azure Sentinel Workspace (1).mp4

19.6 MB

011. Creating Azure Sentinel Workspace.mp4

19.6 MB

012. Azure Sentinel - RBAC (1).mp4

60.5 MB

012. Azure Sentinel - RBAC.mp4

60.5 MB

013. Data Connectors (1).mp4

29.6 MB

013. Data Connectors.mp4

29.6 MB

014. Onboarding Windows host to Sentinel (1).mp4

16.2 MB

014. Onboarding Windows host to Sentinel.mp4

16.2 MB

015. Ingesting Events to Sentinel (1).mp4

13.3 MB

015. Ingesting Events to Sentinel.mp4

13.3 MB

016. Sentinel Watchlist (1).mp4

24.0 MB

016. Sentinel Watchlist.mp4

24.0 MB

017. Sentinel - Creating a Watchlist for Tor Nodes-Edited (1).mp4

41.0 MB

017. Sentinel - Creating a Watchlist for Tor Nodes-Edited.mp4

41.0 MB

018. Sentinel - Create Hunting Query.mp4

85.3 MB

019. Sentinel - Live Stream (1).mp4

8.8 MB

019. Sentinel - Live Stream.mp4

8.8 MB

020. Sentinel - Capturing Traffic from TOR Exit Nodes (1).mp4

40.6 MB

020. Sentinel - Capturing Traffic from TOR Exit Nodes.mp4

40.6 MB

021. Sentinel - Create Analytical Rules (1).mp4

40.8 MB

021. Sentinel - Create Analytical Rules.mp4

40.8 MB

022. Analytical Rule Type - Fusion (1).mp4

24.7 MB

022. Analytical Rule Type - Fusion.mp4

24.7 MB

023. Analytical Rule Types - Security Types (1).mp4

9.5 MB

023. Analytical Rule Types - Security Types.mp4

9.5 MB

024. Analytical Rule Types - ML-Based Behavioral Analytics (1).mp4

7.4 MB

024. Analytical Rule Types - ML-Based Behavioral Analytics.mp4

7.4 MB

025. Analytical Rule Types - Anomaly, Scheduled Alerts, and NRT (1).mp4

15.7 MB

025. Analytical Rule Types - Anomaly, Scheduled Alerts, and NRT.mp4

15.7 MB

026. Creating Analytics Rules Based on Template (1).mp4

12.2 MB

026. Creating Analytics Rules Based on Template.mp4

12.2 MB

027. Creating Analytic Rules Based on Wizard (1).mp4

36.4 MB

027. Creating Analytic Rules Based on Wizard.mp4

36.4 MB

028. Managing the Rules (1).mp4

21.2 MB

028. Managing the Rules.mp4

21.2 MB

029. Define Threat Intelligence - CTI (1).mp4

43.9 MB

029. Define Threat Intelligence - CTI.mp4

43.9 MB

030. Create TI - Lab Activity (1).mp4

29.6 MB

030. Create TI - Lab Activity.mp4

29.6 MB

/Chapter 1 Introduction/

002. SC-200 - Microsoft Security Operations Analyst - Course Introduction.mp4

19.6 MB

003. SC-200 - Microsoft Security Operations Analyst - Recent Update.mp4

15.2 MB

001. The Need for SOC Team.mp4

55.5 MB

/Chapter 2 Module 1- Mitigate Threats Using Microsoft 365 Defender/

001. Module 1 - Learning Objectives.mp4

13.8 MB

002. Introduction to Threat Protection.mp4

37.6 MB

003. Microsoft 365 Defender Suite.mp4

17.9 MB

004. Typical Timeline of an Attack.mp4

33.6 MB

005. Microsoft 365 Defender - Interactive Demonstration.mp4

18.2 MB

006. Mitigate Incidents Using Microsoft 365 Defender - Chapter Introduction.mp4

20.6 MB

007. How to Create Your Playground - Lab Environment.mp4

27.1 MB

008. Microsoft 365 Defender Portal - Introduction.mp4

21.4 MB

009. Managing Incidents.mp4

31.3 MB

010. More about Incidents.mp4

16.0 MB

011. Simulate Incidents - Tor Browser.mp4

9.2 MB

012. Managing Incidents.mp4

20.8 MB

013. Managing Alerts.mp4

25.7 MB

014. Investigating Incidents - MITRE ATT-A-CK.mp4

51.0 MB

015. Advance Hunting.mp4

6.9 MB

016. Advance Hunting Schema.mp4

20.6 MB

017. Exploring the Kusto Queries.mp4

39.3 MB

018. Microsoft Threat Experts.mp4

5.1 MB

019. Microsoft Defender for Office 365 - Chapter Introduction.mp4

8.0 MB

020. Microsoft Defender for Office 365 - Key Capabilities.mp4

51.5 MB

021. Microsoft Defender for Office 365 - Key Capabilities - II.mp4

14.3 MB

022. Safeguard Your Organization- M365 Defender for O365 - Lab I.mp4

58.1 MB

023. Safeguard Your Organization- M365 Defender for O365 - Lab II.mp4

12.4 MB

024. Attack Simulation - Lab Activity.mp4

44.9 MB

025. Microsoft Defender for Identity - Introduction.mp4

8.1 MB

026. What Is Microsoft Defender for Identity.mp4

16.4 MB

027. Microsoft Defender for Identity - Key Capabilities.mp4

58.5 MB

028. Installing Sensors on Domain Controller - 1.mp4

19.2 MB

029. Installing Sensors on Domain Controller - 2.mp4

9.4 MB

030. Capturing Lateral Movements.mp4

64.6 MB

031. Threat Hunting Lab.mp4

35.4 MB

032. Microsoft Defender for Identity Sensors - Architecture.mp4

11.0 MB

033. Protect Your Identities with Azure AD Identity Protection - Introduction.mp4

17.3 MB

034. User Risks and Sign-In Risks.mp4

40.1 MB

035. User Risk Policy and Sign-In Risk Policy - Lab Activity.mp4

38.1 MB

036. Cloud App Security - Introduction.mp4

8.3 MB

037. The Cloud App Security Framework.mp4

30.9 MB

038. Conditional Access App Controls.mp4

67.7 MB

039. What Is Information Protection.mp4

35.5 MB

040. Insider Risk Management - Enable Auditing.mp4

3.1 MB

041. Phases of Cloud App security.mp4

36.5 MB

042. Cloud App security Phases - Lab Activity.mp4

30.9 MB

043. Data Loss Prevention - Chapter Introduction.mp4

11.7 MB

044. DLP Alerts.mp4

28.3 MB

045. Create Policies for DLP in Compliance Portal.mp4

27.7 MB

046. Insider Risk Management.mp4

12.9 MB

047. What Is Insider Risk (1).mp4

48.4 MB

047. What Is Insider Risk.mp4

48.4 MB

048. Pain Points of a Modern Workplace (1).mp4

20.1 MB

048. Pain Points of a Modern Workplace.mp4

20.1 MB

049. Insider Risk management with M365 Defender (1).mp4

19.2 MB

049. Insider Risk management with M365 Defender.mp4

19.2 MB

050. Insider Risk Management - Permissions (1).mp4

19.7 MB

050. Insider Risk Management - Permissions.mp4

19.7 MB

051. Module 1 - Summary (1).mp4

13.9 MB

051. Module 1 - Summary.mp4

13.9 MB

/Chapter 3 Module 2 - Mitigate Threats Using Microsoft Defender for Endpoint/

001. Module 2 - Introduction (1).mp4

9.5 MB

001. Module 2 - Introduction.mp4

9.5 MB

002. Defender for Endpoint - Features (1).mp4

28.7 MB

002. Defender for Endpoint - Features.mp4

28.7 MB

003. Defender for Endpoint - Terminology (1).mp4

8.7 MB

003. Defender for Endpoint - Terminology.mp4

8.7 MB

004. Onboarding Devices to Defender (1).mp4

75.7 MB

004. Onboarding Devices to Defender.mp4

75.7 MB

005. Windows 10 Security Enhancements - Chapter Introduction (1).mp4

13.1 MB

005. Windows 10 Security Enhancements - Chapter Introduction.mp4

13.1 MB

006. Attack Surface Reduction Rules (1).mp4

44.1 MB

006. Attack Surface Reduction Rules.mp4

44.1 MB

007. Attack Surface Rules (1).mp4

35.5 MB

007. Attack Surface Rules.mp4

35.5 MB

008. Device Inventory (1).mp4

19.1 MB

008. Device Inventory.mp4

19.1 MB

009. Device Investigation -Alerts (1).mp4

47.3 MB

009. Device Investigation -Alerts.mp4

47.3 MB

010. Behavioral Blocking (1).mp4

32.6 MB

010. Behavioral Blocking.mp4

32.6 MB

011. Client Behavioral Blocking (1).mp4

19.5 MB

011. Client Behavioral Blocking.mp4

19.5 MB

012. EDR- Block Mode (1).mp4

14.4 MB

012. EDR- Block Mode.mp4

14.4 MB

013. EDR- Block Mode - Lab Activity (1).mp4

12.0 MB

013. EDR- Block Mode - Lab Activity.mp4

12.0 MB

014. Performing Actions on the Device (1).mp4

48.6 MB

014. Performing Actions on the Device.mp4

48.6 MB

015. Live Response (1).mp4

24.5 MB

015. Live Response.mp4

24.5 MB

016. Perform Evidence and Entities Investigations (1).mp4

13.8 MB

016. Perform Evidence and Entities Investigations.mp4

13.8 MB

017. User Investigations (1).mp4

18.4 MB

017. User Investigations.mp4

18.4 MB

018. Advance Automated Remediation Features - Endpoint (1).mp4

24.8 MB

018. Advance Automated Remediation Features - Endpoint.mp4

24.8 MB

019. Managing File Uploads (1).mp4

8.8 MB

019. Managing File Uploads.mp4

8.8 MB

020. Automation Folder Exclusion (1).mp4

5.6 MB

020. Automation Folder Exclusion.mp4

5.6 MB

021. File Level Investigation (1).mp4

32.9 MB

021. File Level Investigation.mp4

32.9 MB

022. Automating Device Group Remediation (1).mp4

13.0 MB

022. Automating Device Group Remediation.mp4

13.0 MB

023. Blocking Risky Devices Using Intune, Defender, and Azure AD (1).mp4

49.6 MB

023. Blocking Risky Devices Using Intune, Defender, and Azure AD.mp4

49.6 MB

024. Configure Alerts and Detections - Chapter Introduction (1).mp4

10.0 MB

024. Configure Alerts and Detections - Chapter Introduction.mp4

10.0 MB

025. Configuring Advance Features (1).mp4

12.4 MB

025. Configuring Advance Features.mp4

12.4 MB

026. Configuring Email Notifications (1).mp4

23.6 MB

026. Configuring Email Notifications.mp4

23.6 MB

027. Indicators of Compromise (1).mp4

19.1 MB

027. Indicators of Compromise.mp4

19.1 MB

028. Threat and Vulnerability Management - Chapter Introduction (1).mp4

10.4 MB

028. Threat and Vulnerability Management - Chapter Introduction.mp4

10.4 MB

029. Threat and Vulnerability Management - Explanation (1).mp4

40.7 MB

029. Threat and Vulnerability Management - Explanation.mp4

40.7 MB

030. Module 2 - Summary (1).mp4

28.8 MB

030. Module 2 - Summary.mp4

28.8 MB

/Chapter 4 Module 3 - Mitigate Threats Using Microsoft Defender for Cloud/

001. Module 3 - Introduction (1).mp4

3.6 MB

001. Module 3 - Introduction.mp4

3.6 MB

002. What Is Azure Security Center (1).mp4

8.6 MB

002. What Is Azure Security Center.mp4

8.6 MB

003. Microsoft Defender for Cloud - Features (1).mp4

30.2 MB

003. Microsoft Defender for Cloud - Features.mp4

30.2 MB

004. Azure Defender for Cloud - Lab Activity (1).mp4

66.9 MB

004. Azure Defender for Cloud - Lab Activity.mp4

66.9 MB

005. CSPM and CWP (1).mp4

5.9 MB

005. CSPM and CWP.mp4

5.9 MB

006. Which Resources Are Protected Using Microsoft Defender (1).mp4

7.3 MB

006. Which Resources Are Protected Using Microsoft Defender.mp4

7.3 MB

007. Benefits of Azure Defender for Servers (1).mp4

68.8 MB

007. Benefits of Azure Defender for Servers.mp4

68.8 MB

008. Defender for App Services (1).mp4

51.3 MB

008. Defender for App Services.mp4

51.3 MB

009. Defender for App Services - Lab (1).mp4

14.8 MB

009. Defender for App Services - Lab.mp4

14.8 MB

010. Defender for Storage - Lab (1).mp4

40.4 MB

010. Defender for Storage - Lab.mp4

40.4 MB

011. Defender for SQL - Lab (1).mp4

27.8 MB

011. Defender for SQL - Lab.mp4

27.8 MB

012. Defender for Keyvault (1).mp4

12.3 MB

012. Defender for Keyvault.mp4

12.3 MB

013. Defender for DNS (1).mp4

15.3 MB

013. Defender for DNS.mp4

15.3 MB

014. Defender for Kubernetes (1).mp4

25.4 MB

014. Defender for Kubernetes.mp4

25.4 MB

015. Defender for Container Registry (1).mp4

17.1 MB

015. Defender for Container Registry.mp4

17.1 MB

016. Connect Azure Assets to Azure Defender- Chapter Introduction (1).mp4

9.2 MB

016. Connect Azure Assets to Azure Defender- Chapter Introduction.mp4

9.2 MB

017. Asset Inventory - Lab (1).mp4

30.5 MB

017. Asset Inventory - Lab.mp4

30.5 MB

018. Auto-Provisioning (1).mp4

25.0 MB

018. Auto-Provisioning.mp4

25.0 MB

019. Stored Event Types (1).mp4

15.2 MB

019. Stored Event Types.mp4

15.2 MB

020. Manual Provisioning (1).mp4

4.4 MB

020. Manual Provisioning.mp4

4.4 MB

021. Connect Non-Azure Resources to Defender (1).mp4

7.5 MB

021. Connect Non-Azure Resources to Defender.mp4

7.5 MB

022. Onboarding Methods (1).mp4

12.6 MB

022. Onboarding Methods.mp4

12.6 MB

023. Onboard GCP Instance to Azure ARC (1).mp4

57.9 MB

023. Onboard GCP Instance to Azure ARC.mp4

57.9 MB

024. Onboarding AWS Services to Defender Cloud (1).mp4

34.4 MB

024. Onboarding AWS Services to Defender Cloud.mp4

34.4 MB

025. Remediating Security Alerts- Chapter Introduction (1).mp4

10.4 MB

025. Remediating Security Alerts- Chapter Introduction.mp4

10.4 MB

026. Changing World and Attackers (1).mp4

38.0 MB

026. Changing World and Attackers.mp4

38.0 MB

027. What Are Security Alerts and Notifications (1).mp4

18.4 MB

027. What Are Security Alerts and Notifications.mp4

18.4 MB

028. How Does a Defender Work (1).mp4

44.5 MB

028. How Does a Defender Work.mp4

44.5 MB

029. Alert Severity Level (1).mp4

24.0 MB

029. Alert Severity Level.mp4

24.0 MB

030. Continuous Monitoring and Assessments (1).mp4

18.1 MB

030. Continuous Monitoring and Assessments.mp4

18.1 MB

031. MITRE Attack Tactics and Alert Types (1).mp4

44.7 MB

031. MITRE Attack Tactics and Alert Types.mp4

44.7 MB

032. Remediating Alerts (1).mp4

13.6 MB

032. Remediating Alerts.mp4

13.6 MB

033. Automated Responses (1).mp4

13.0 MB

033. Automated Responses.mp4

13.0 MB

034. Alert Suppression (1).mp4

11.3 MB

034. Alert Suppression.mp4

11.3 MB

035. Module 3 - Summary (1).mp4

16.1 MB

035. Module 3 - Summary.mp4

16.1 MB

/Chapter 5 Module 4 - Create Queries for Microsoft Sentinel Using Kusto Query Language/

001. Module 4 - Introduction (1).mp4

3.7 MB

001. Module 4 - Introduction.mp4

3.7 MB

002. The Construct of KQL Language (1).mp4

5.6 MB

002. The Construct of KQL Language.mp4

5.6 MB

003. The Lab Environment (1).mp4

21.0 MB

003. The Lab Environment.mp4

21.0 MB

004. Declaring Variables with Let (1).mp4

27.7 MB

004. Declaring Variables with Let.mp4

27.7 MB

005. Search and Where Operator (1).mp4

40.6 MB

005. Search and Where Operator.mp4

40.6 MB

006. Extend Operator (1).mp4

22.2 MB

006. Extend Operator.mp4

22.2 MB

007. Order by Usage (1).mp4

22.6 MB

007. Order by Usage.mp4

22.6 MB

008. Project Operator (1).mp4

40.4 MB

008. Project Operator.mp4

40.4 MB

009. Summarize, Count, and DCount Functions (1).mp4

44.7 MB

009. Summarize, Count, and DCount Functions.mp4

44.7 MB

010. Arg Max and Arg Min Functions (1).mp4

17.1 MB

010. Arg Max and Arg Min Functions.mp4

17.1 MB

011. Make List and Make Set Functions (1).mp4

19.8 MB

011. Make List and Make Set Functions.mp4

19.8 MB

012. Render Operator (1).mp4

39.5 MB

012. Render Operator.mp4

39.5 MB

013. Bin Function (1).mp4

25.3 MB

013. Bin Function.mp4

25.3 MB

014. Union Operator (1).mp4

14.4 MB

014. Union Operator.mp4

14.4 MB

015. Module 4 Summary (1).mp4

7.5 MB

015. Module 4 Summary.mp4

7.5 MB

/Chapter 7 Module 6 - Microsoft Sentinel Environment - Connecting Logs/

001. Module 6 Introduction (1).mp4

2.3 MB

001. Module 6 Introduction.mp4

2.3 MB

002. Connect M365 Defender to Sentinel (1).mp4

13.5 MB

002. Connect M365 Defender to Sentinel.mp4

13.5 MB

003. Office 365 Log Connector (1).mp4

11.9 MB

003. Office 365 Log Connector.mp4

11.9 MB

004. Azure Activity Log Connector (1).mp4

10.9 MB

004. Azure Activity Log Connector.mp4

10.9 MB

005. Azure Active Directory Identity Protection Connector (1).mp4

13.6 MB

005. Azure Active Directory Identity Protection Connector.mp4

13.6 MB

006. Defender for Office 365 Connector (1).mp4

14.2 MB

006. Defender for Office 365 Connector.mp4

14.2 MB

007. Defender for Endpoint Connector (1).mp4

22.7 MB

007. Defender for Endpoint Connector.mp4

22.7 MB

008. Connect Threat Indicators to Microsoft Sentinel (1).mp4

35.8 MB

008. Connect Threat Indicators to Microsoft Sentinel.mp4

35.8 MB

/Chapter 8 Module 7 - Microsoft Sentinel Environment - Incidents, Threat Response, UEBA, and Monitoring/

001. Module 7 Introduction (1).mp4

1.8 MB

001. Module 7 Introduction.mp4

1.8 MB

002. Key Concepts of Incident Management - I (1).mp4

12.8 MB

002. Key Concepts of Incident Management - I.mp4

12.8 MB

003. Investigations in Azure Sentinel (1).mp4

27.8 MB

003. Investigations in Azure Sentinel.mp4

27.8 MB

004. Key Concepts of Incident Management - II (1).mp4

32.6 MB

004. Key Concepts of Incident Management - II.mp4

32.6 MB

005. Incident Management in Microsoft Sentinel - I (1).mp4

23.1 MB

005. Incident Management in Microsoft Sentinel - I.mp4

23.1 MB

006. Incident Management in Microsoft Sentinel - II (1).mp4

22.7 MB

006. Incident Management in Microsoft Sentinel - II.mp4

22.7 MB

007. Brute Force Attack against Azure Portal - Simulation (1).mp4

14.9 MB

007. Brute Force Attack against Azure Portal - Simulation.mp4

14.9 MB

008. Threat Response with Microsoft Sentinel Playbooks - Intr (1).mp4

31.2 MB

008. Threat Response with Microsoft Sentinel Playbooks - Introduc.mp4

31.2 MB

009. Step 1 - Creating Analytical Rule to Look for Role Membe (1).mp4

29.5 MB

009. Step 1 - Creating Analytical Rule to Look for Role Membershi.mp4

29.5 MB

010. Step 2 - Integrate Log Analytics with Azure AD Audit Log (1).mp4

20.7 MB

010. Step 2 - Integrate Log Analytics with Azure AD Audit Logs.mp4

20.7 MB

011. Step 3 - Verify Log Analytics (1).mp4

13.7 MB

011. Step 3 - Verify Log Analytics.mp4

13.7 MB

012. Step 4 - Incident Creation in Sentinel (1).mp4

19.7 MB

012. Step 4 - Incident Creation in Sentinel.mp4

19.7 MB

013. Step 5 - Create Logic App to Integrate with Microsoft Te (1).mp4

50.9 MB

013. Step 5 - Create Logic App to Integrate with Microsoft Teams.mp4

50.9 MB

014. Step 6 - Edit Analytical Rule to Add Logic App - Playboo (1).mp4

9.1 MB

014. Step 6 - Edit Analytical Rule to Add Logic App - Playbooks.mp4

9.1 MB

015. Testing the Integration (1).mp4

17.3 MB

015. Testing the Integration.mp4

17.3 MB

016. UEBA - User Entity Behavior Analytics - Introduction (1).mp4

64.3 MB

016. UEBA - User Entity Behavior Analytics - Introduction.mp4

64.3 MB

017. Entity Behavior Lab -I (1).mp4

19.7 MB

017. Entity Behavior Lab -I.mp4

19.7 MB

018. Entity Behavior Lab -II (1).mp4

22.9 MB

018. Entity Behavior Lab -II.mp4

22.9 MB

019. Workbooks - Introduction (1).mp4

15.3 MB

019. Workbooks - Introduction.mp4

15.3 MB

020. Create Workbooks Using Template (1).mp4

47.7 MB

020. Create Workbooks Using Template.mp4

47.7 MB

021. Create Workbook from scratch (1).mp4

32.9 MB

021. Create Workbook from scratch.mp4

32.9 MB

/Chapter 9 Module 8 - Perform Threat Hunting with Microsoft Sentinel/

001. Module 8 Introduction (1).mp4

2.5 MB

001. Module 8 Introduction.mp4

2.5 MB

002. Cyber Security Threat Hunting (1).mp4

45.9 MB

002. Cyber Security Threat Hunting.mp4

45.9 MB

003. The Need for Proactive Hunting (1).mp4

31.7 MB

003. The Need for Proactive Hunting.mp4

31.7 MB

004. Develop a Threat Hunting Hypothesis (1).mp4

53.1 MB

004. Develop a Threat Hunting Hypothesis.mp4

53.1 MB

005. Threat Hunting - Recap (1).mp4

37.8 MB

005. Threat Hunting - Recap.mp4

37.8 MB

006. Notebooks - Introduction (1).mp4

16.0 MB

006. Notebooks - Introduction.mp4

16.0 MB

007. Sentinel Notebooks - Lab Activity (1).mp4

48.0 MB

007. Sentinel Notebooks - Lab Activity.mp4

48.0 MB

/Chapter 10 SC 200 - Microsoft Security Operations Analyst - Course Summary/

001. Microsoft Security Operations Analyst - Course Summary (1).mp4

27.3 MB

001. Microsoft Security Operations Analyst - Course Summary.mp4

27.3 MB

 

Total files 353


Copyright © 2025 FileMood.com