SC-200 uses KQL to query logs, analyze threats, build detections, and perform threat hunting.
Kusto Query Language is used extensively in SC-200 for analysis and detection.Learners write KQL queries to search logs, summarize data, and create visualizations.
KQL is essential for effective threat hunting.
“Utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting.”
Expert Trainer
Expert Trainer
SC-200 focuses on investigating, responding to, and hunting cyber threats using Microsoft Sentinel and Microsoft Defender technologies.
SC-200 covers proactive threat hunting using Microsoft Sentinel queries, bookmarks, livestream, and notebooks.
SC-200 uses Microsoft Sentinel as the central SIEM and SOAR platform for detection, investigation, and response.
Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.