SC-200 uses Microsoft Sentinel as the central SIEM and SOAR platform for detection, investigation, and response.
Microsoft Sentinel is a core component of SC-200. The course covers configuring Sentinel workspaces, connecting data sources, creating detections, and managing incidents.Sentinel is also used for automation and threat hunting.
Sentinel provides centralized visibility across environments.
SC-200 covers proactive threat hunting using Microsoft Sentinel queries, bookmarks, livestream, and notebooks.
byAlexis HIRSCHHORN
SC-200 focuses on investigating, responding to, and hunting cyber threats using Microsoft Sentinel and Microsoft Defender technologies.
byManuel VARTANIAN
SC-200 uses KQL to query logs, analyze threats, build detections, and perform threat hunting.
byAlexis HIRSCHHORN
Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.