SC-200 covers proactive threat hunting using Microsoft Sentinel queries, bookmarks, livestream, and notebooks.
The course includes a dedicated module on threat hunting.Participants learn to develop hypotheses, run queries, and use notebooks for advanced analysis.
Threat hunting complements alert-based detection.
“Perform threat hunting in Microsoft Sentinel.”
Expert Trainer
Expert Trainer
SC-200 focuses on investigating, responding to, and hunting cyber threats using Microsoft Sentinel and Microsoft Defender technologies.
SC-200 uses Microsoft Sentinel as the central SIEM and SOAR platform for detection, investigation, and response.
SC-200 uses KQL to query logs, analyze threats, build detections, and perform threat hunting.
Necessary cookies are always active. You can accept, reject non-essential cookies, or customize your preferences.