SC-200 uses Microsoft Sentinel as the central SIEM and SOAR platform for detection, investigation, and response.
Microsoft Sentinel is a core component of SC-200. The course covers configuring Sentinel workspaces, connecting data sources, creating detections, and managing incidents.Sentinel is also used for automation and threat hunting.
Sentinel provides centralized visibility across environments.
“Configure and use Microsoft Sentinel.”
Expert Trainer
Expert Trainer
SC-200 covers proactive threat hunting using Microsoft Sentinel queries, bookmarks, livestream, and notebooks.
SC-200 focuses on investigating, responding to, and hunting cyber threats using Microsoft Sentinel and Microsoft Defender technologies.
SC-200 uses KQL to query logs, analyze threats, build detections, and perform threat hunting.
Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.