Our cloud training videos have over 100K views on YouTube

SC-200: Microsoft Security Operations Analyst

Last Updated: 02-07-2025

The SC-200: Microsoft Security Operations Analyst course is designed to help IT professionals and cybersecurity analysts prepare for the Microsoft Certified: Security Operations Analyst Associate certification. As cyber threats continue to grow in volume and complexity, organizations rely on skilled professionals to detect, investigate, and respond to threats across hybrid environments.

This hands-on training focuses on using key Microsoft security tools such as Microsoft Defender XDR, KQL,  Microsoft Sentinel, Microsoft Defender for Endpoint (EDR tool), Microsoft Defender for Identity, Identity Protection and Microsoft Defender for Cloud. You’ll learn how to implement threat detection, automate response strategies, and monitor security operations effectively.

Whether you're preparing for the SC-200 certification exam or aiming to advance your career in security operations, this course equips you with the real-world skills and confidence to protect enterprise environments using Microsoft security solutions.

thumbnail

450K+

Career Transformation

250+

Workshop Every Month

100+

Countries and Counting

Schedule Learners Course Fee (Incl. of all Taxes) Register Your Interest
July 07th - 10th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
10% Off
$448
$403
Fast Filling! Hurry Up.
July 14th - 17th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
10% Off
$448
$403
July 21st - 30th
06:00 PM - 10:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
10% Off
$448
$403
July 28th - 31st
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
Guaranteed-to-Run
10% Off
$448
$403
August 04th - 07th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
20% Off
$448
$358
August 11th - 14th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
20% Off
$448
$358
August 18th - 27th
06:00 PM - 10:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
20% Off
$448
$358
August 25th - 28th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
Guaranteed-to-Run
20% Off
$448
$358
September 01st - 04th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
25% Off
$448
$336

Course Prerequisites

It is recommended that participants have:

  • A basic understanding of Azure and Microsoft 365 services.
  • Familiarity with general IT security principles and practices.
  • Experience with Microsoft Entra ID, network security, and threat management.

Having prior experience in IT administration or security operations will be helpful for understanding the course content more effectively.

Learning Objectives

Manage a Security Operations Environment (20–25%)

  • Configure Defender XDR settings, alerts, automation, and attack disruption

  • Manage devices, permissions, exposure, and vulnerabilities

  • Plan and configure Microsoft Sentinel: roles, storage, data ingestion

  • Integrate data sources (Syslog, CEF, WEF, Azure resources)

  • Monitor and optimize data ingestion


 Configure Protections and Detections (15–20%)

  • Set policies in Defender for Endpoint, Cloud Apps, Office 365, Cloud

  • Create/manage custom detections, alert tuning, deception in XDR

  • Configure analytics rules, behavioral analytics, and ASIM in Sentinel


 Manage Incident Response (25–30%)

  • Investigate/remediate threats across Defender XDR and Microsoft 365

  • Use audit logs, Graph logs, content search

  • Respond to incidents in Sentinel with playbooks and automation

  • Use Microsoft Security Copilot for threat analysis and response


 Manage Security Threats (15–20%)

  • Threat hunting in XDR and Sentinel using KQL and MITRE ATT&CK

  • Manage threat indicators, bookmarks, archived logs

  • Create custom hunting queries and workbooks in Sentinel

Target Audience

  • Security Operations Analysts
  • IT Security Professionals
  • Cloud Security Engineers and Cloud Architects
  • Security Consultants and Advisors
  • IT Administrators
  • Network Security Engineers
  • Security Managers and Compliance Officers
  • Professionals preparing for the SC-200 certification exam

Course Modules

Learning Path 1: Mitigate threats using Microsoft Defender XDR

Modules:

  1. Introduction to Microsoft 365 threat protection

  2. Mitigate incidents using Microsoft Defender XDR

  3. Protect your identities with Entra ID Protection

  4. Remediate risks with Microsoft Defender for Office 365

  5. Safeguard your environment with Microsoft Defender for Identity

  6. Secure your cloud apps and services with Microsoft Defender for Cloud Apps


Learning Path 2: Get started with Microsoft Copilot for Security

Modules:

  1. Fundamentals of Generative AI

  2. Describe Microsoft Copilot for Security

  3. Describe core features of Microsoft Copilot for Security

  4. Describe the Microsoft Copilot for Security embedded experience


Learning Path 3: Mitigate threats using Microsoft Purview

Modules:

  1. Microsoft Purview Compliance Solutions

  2. Respond to data loss prevention alerts using Microsoft Purview

  3. Manage insider risk in Microsoft Purview

  4. Investigate threats using Content search in Microsoft Purview

  5. Investigate threats using Microsoft Purview Audit


Learning Path 4: Mitigate threats using Microsoft Defender for Endpoint

Modules:

  1. Protect against threats with Microsoft Defender for Endpoint

  2. Deploy the Microsoft Defender for Endpoint environment

  3. Implement Windows security enhancements with Microsoft Defender for Endpoint

  4. Perform device investigations in Microsoft Defender for Endpoint

  5. Perform actions on a device using Microsoft Defender for Endpoint

  6. Perform evidence and entities investigations using Microsoft Defender for Endpoint

  7. Configure and manage automation using Microsoft Defender for Endpoint

  8. Configure for alerts and detections in Microsoft Defender for Endpoint

  9. Utilize Vulnerability Management in Microsoft Defender for Endpoint


Learning Path 5: Mitigate threats using Microsoft Defender for Cloud

Modules:

  1. Plan for cloud workload protections using Microsoft Defender for Cloud

  2. Connect Azure assets to Microsoft Defender for Cloud

  3. Connect non-Azure resources to Microsoft Defender for Cloud

  4. Manage your cloud security posture management

  5. Explain cloud workload protections in Microsoft Defender for Cloud

  6. Remediate security alerts using Microsoft Defender for Cloud


Learning Path 6: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

Modules:

  1. Construct KQL statements for Microsoft Sentinel

  2. Analyze query results using KQL

  3. Build multi-table statements using KQL

  4. Work with data in Microsoft Sentinel using Kusto Query Language


Learning Path 7: Configure your Microsoft Sentinel environment

Modules:

  1. Introduction to Microsoft Sentinel

  2. Create and manage Microsoft Sentinel workspaces

  3. Query logs in Microsoft Sentinel

  4. Use watchlists in Microsoft Sentinel

  5. Utilize threat intelligence in Microsoft Sentinel

  6. Integrate Microsoft Defender XDR with Microsoft Sentinel


Learning Path 8: Connect logs to Microsoft Sentinel

Modules:

  1. Connect data to Microsoft Sentinel using data connectors

  2. Connect Microsoft services to Microsoft Sentinel

  3. Connect Microsoft Defender XDR to Microsoft Sentinel

  4. Connect Windows hosts to Microsoft Sentinel

  5. Connect Common Event Format logs to Microsoft Sentinel

  6. Connect syslog data sources to Microsoft Sentinel

  7. Connect threat indicators to Microsoft Sentinel


Learning Path 9: Create detections and perform investigations using Microsoft Sentinel

Modules:

  1. Threat detection with Microsoft Sentinel analytics

  2. Automation in Microsoft Sentinel

  3. Threat response with Microsoft Sentinel playbooks

  4. Security incident management in Microsoft Sentinel

  5. Identify threats with Entity behavioral analytics in Microsoft Sentinel

  6. Data normalization in Microsoft Sentinel

  7. Query, visualize, and monitor data in Microsoft Sentinel

  8. Manage content in Microsoft Sentinel


Learning Path 10: Perform threat hunting in Microsoft Sentinel

Modules:

  1. Explain threat hunting concepts in Microsoft Sentinel

  2. Threat hunting with Microsoft Sentinel

  3. Use Search jobs in Microsoft Sentinel

  4. Hunt for threats using notebooks in Microsoft Sentinel

Course FAQs

SC-200 training is specifically designed to ensure you are fully prepared for the Microsoft SC-200 certification exam. The training covers exam objectives and includes practical labs, real-world scenarios, and exam practice questions to reinforce your learning and boost your confidence.
Yes! We offer both in-person and online SC-200 training options. Online training includes flexible, self-paced courses or live, instructor-led sessions. Whether you prefer structured classroom learning or the convenience of learning from home, we’ve got you covered.
You can easily register for SC-200 training through our course page. Simply choose the training schedule that best fits your availability.
While we cannot guarantee you will pass the exam, our SC-200 training provides the most comprehensive preparation available. With certified expert instructors, hands-on labs, and extensive exam practice materials, you'll be fully equipped to succeed in the SC-200 certification exam.
Yes, we provide access to the official Microsoft course materials, so you can revisit courseware along with labs, and practice exams even after the course has ended. This can be a great way to stay updated with any changes to the SC-200 exam.
No, you don't need to worry about setting up your own software or accounts. We provide official labs with all the required licenses, tenants, and subscriptions for Microsoft Sentinel and Microsoft Defender. All you need is a laptop or desktop with internet access to access these labs over the web and gain hands-on experience. Our training ensures you have everything you need to successfully complete the SC-200 training without additional setup.

Register Your Interest

What Our Learners Are Saying