17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Sc-200 - Microsoft Security Operations Analyst By Christopher Nett
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Language: English | Size: 2.14 GB | Duration: 8h 13m
Elevate your SOC career and get certified now! Learn through practical labs aligned with the official study guide
What you'll learn
Pass the SC-200 Exam
Mitigate threats by using Defender for Cloud (15–20%)
Mitigate threats by using Microsoft Sentinel (50–55%)
Mitigate threats by using Defender XDR (25–30%)
Requirements
Basic IT Knowledge
No Azure or Cyber Security experience necessary
Willingness to learn cool stuff!
If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com
Get More Tutorials and Support Us -->> https://CourseWikia.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction/1 - Welcome About your Instructor.mp4
12.4 MB
~Get Your Files Here !/1 - Introduction/2 - Course Content SC200 Exam.mp4
1.5 MB
~Get Your Files Here !/1 - Introduction/3 - FAQs.html
702 B
~Get Your Files Here !/1 - Introduction/4 - IMPORTANT Defender M365 is now Defender XDR.html
257 B
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/68 - Overview.mp4
11.3 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/69 - Typical data sources for a SIEM.mp4
7.4 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/70 - Demo Content Hub.mp4
21.8 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/71 - Demo Ingesting Threat Intelligence into Sentinel.mp4
21.9 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/72 - Demo Verify Threat Intelligence Log Ingestion.mp4
6.5 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/73 - Demo Ingesting Entra ID into Sentinel.mp4
10 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/74 - Demo Deploy Sentinel Training Lab.mp4
7.8 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/75 - AMA and DCR.mp4
9.1 MB
~Get Your Files Here !/10 - Sentinel Plan and implement the use of data connectors for ingestion/76 - Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4
37.1 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/77 - Sentinel Workflow.mp4
7.8 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/78 - Analytic rules.mp4
4 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/79 - Demo Analytic Rules.mp4
11.6 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/80 - Scheduled Analytic Rules.mp4
2.6 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/81 - Demo Scheduled Analytic Rules Entra ID.mp4
20.1 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/82 - Demo Scheduled Analytic Rules Windows Security Events.mp4
12.6 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/83 - NearRealTimeRules NRT.mp4
2 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/84 - Demo NearRealTimeRules NRT.mp4
15.5 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/85 - Fusion.mp4
3.8 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/86 - Demo Fusion.mp4
21.6 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/87 - ML Behavior Analytics.mp4
6.3 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/88 - Demo ML Behavior Analytics.mp4
10 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/89 - Threat Intelligence Rules.mp4
2.3 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/90 - Demo Threat Intelligence Rules.mp4
6.7 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/91 - Microsoft Security Rules.mp4
1.7 MB
~Get Your Files Here !/11 - Sentinel Manage Microsoft Sentinel analytics rules/92 - Demo Microsoft Security Rules.mp4
4.2 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/100 - Demo Playbook with MITRE ATTCK ChatGPT.mp4
36.7 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/101 - Sentinel REST API.mp4
4.1 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/93 - Automation Capabilities in Sentinel.mp4
7.9 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/94 - Automation rules.mp4
1.6 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/95 - Demo Automation rules.mp4
1.7 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/96 - Playbooks.mp4
2.4 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/97 - Automation rules vs Playbooks.mp4
5.2 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/98 - Azure Logic Apps.mp4
8.6 MB
~Get Your Files Here !/12 - Sentinel Configure security orchestration automated response SOAR/99 - Demo Playbooks Azure Logic Apps.mp4
34.8 MB
~Get Your Files Here !/13 - Sentinel Manage Microsoft Sentinel incidents/102 - Demo Incident Dashboard.mp4
89.2 MB
~Get Your Files Here !/14 - Sentinel Use Microsoft Sentinel workbooks to analyze and interpret data/103 - Workbooks in Sentinel.mp4
1.6 MB
~Get Your Files Here !/14 - Sentinel Use Microsoft Sentinel workbooks to analyze and interpret data/104 - Demo Create Workbooks.mp4
32.2 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/105 - Overview on MITRE ATTCK.mp4
12.6 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/106 - Demo MITRE ATTCK.mp4
91.8 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/107 - Demo ATTCK in Sentinel.mp4
37.6 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/108 - What is Threat Hunting.mp4
7 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/109 - KQL 101.mp4
29.3 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/110 - Demo KQL 101.mp4
53.2 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/111 - Demo Threat Hunting in Sentinel.mp4
12.2 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/112 - Demo Hunt for Entra ID Events.mp4
33.3 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/113 - Notebooks.mp4
4.3 MB
~Get Your Files Here !/15 - Sentinel Hunt for threats by using Microsoft Sentinel/114 - Demo Notebooks with MSTICPy.mp4
197.9 MB
~Get Your Files Here !/16 - Sentinel Manage threats by using entity behavior analytics/115 - UEBA in Sentinel.mp4
9.8 MB
~Get Your Files Here !/16 - Sentinel Manage threats by using entity behavior analytics/116 - Demo UEBA in Sentinel.mp4
35.5 MB
~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/117 - What is XDR.mp4
4 MB
~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/118 - Demo Manage Incidents and Alerts.mp4
21.3 MB
~Get Your Files Here !/17 - Defender XDR Manage extended detection and response XDR in Defender XDR/119 - Demo Secure Score.mp4
11.9 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/120 - What is Defender for Office 365.mp4
2.8 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/121 - Defender for Office 365 Edge Protection.mp4
5.8 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/122 - Defender for Office 365 Sender Intelligence.mp4
10.6 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/123 - Defender for Office 365 Content Filtering.mp4
9.4 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/124 - Defender for Office 365 Post Delivery Protection.mp4
7.2 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/125 - Demo Preset Security Policies.mp4
22.3 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/126 - Demo AntiPhishing Policy.mp4
28.4 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/127 - Demo AntiSpam Policy.mp4
25 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/128 - Demo AntiMalware Policy.mp4
8.8 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/129 - Demo Safe Attachments.mp4
10.1 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/130 - Demo Safe Links.mp4
12.1 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/131 - Demo Tenant AllowBlock Lists.mp4
6.2 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/132 - What is Defender for Cloud Apps.mp4
7.6 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/133 - Demo Cloud App Catalog.mp4
69.5 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/134 - Demo Cloud App Policies.mp4
17.6 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/135 - Purview.txt
33 B
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/135 - What is Microsoft Purview.mp4
4.7 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/136 - Demo Data Loss Prevention Policies.mp4
25.4 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/136 - Purview.txt
33 B
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/137 - Demo Insider Risk Policies.mp4
23.6 MB
~Get Your Files Here !/18 - Defender XDR Mitigate threats to the Microsoft 365 environment/137 - Purview.txt
33 B
~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/138 - What is Defender for Endpoint.mp4
5.9 MB
~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/139 - Demo Management and Administration.mp4
86.8 MB
~Get Your Files Here !/19 - Defender XDR Mitigate endpoint threats by using Defender for Endpoint/140 - Demo Vulnerability Management.mp4
24.1 MB
~Get Your Files Here !/2 - SOC Basics/5 - Complexity and Cyber Security Challenges.mp4
16.2 MB
~Get Your Files Here !/2 - SOC Basics/6 - What is a SOC.mp4
10 MB
~Get Your Files Here !/2 - SOC Basics/7 - SOC Tier Model.mp4
8 MB
~Get Your Files Here !/2 - SOC Basics/8 - Cyber Security Incident Reponse Process.mp4
5.7 MB
~Get Your Files Here !/2 - SOC Basics/9 - EDR XDR SIEM SOAR.mp4
8.3 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/141 - Identities are the new security perimeter.mp4
2.4 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/142 - NTLM.mp4
13 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/143 - PasstheHash Attacks.mp4
6.5 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/144 - Kerberos.mp4
8.7 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/145 - PassTheTicket Attacks.mp4
3.8 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/146 - Brute Force Attacks.mp4
8.3 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/147 - Remote Code Execution Attacks.mp4
4.4 MB
~Get Your Files Here !/20 - Defender XDR Mitigate identity threats/148 - What is Defender for Identity.mp4
11.3 MB
~Get Your Files Here !/3 - Azure Basics/10 - Cloud Types.mp4
5.7 MB
~Get Your Files Here !/3 - Azure Basics/11 - Shared Responsibility Model.mp4
7.7 MB
~Get Your Files Here !/3 - Azure Basics/12 - Azure Resource Hierarchy.mp4
5.2 MB
~Get Your Files Here !/4 - Microsoft Security Basics/13 - The Microsoft Security Cosmos.mp4
15.4 MB
~Get Your Files Here !/4 - Microsoft Security Basics/14 - Defending Across Attack Chains.mp4