Loading Events

Microsoft Security Operations Analyst Training . ©

16 Dec 2024 - 20 Dec 2024

 

The Goals

 

The Microsoft Security Operations Analyst training is designed to provide learners with a comprehensive understanding of security operations concepts and practices. By the end of this course, participants should be able to:

  • Understand security operations concepts and techniques.
  • Develop and implement a security incident response plan.
  • Use various tools and techniques to identify and investigate security incidents.
  • Analyze and report on security incidents.
  • Implement threat protection technologies to prevent future security incidents.
  • Use Microsoft 365 Defender to monitor and respond to security incidents.
  • Develop and implement a vulnerability management program.
  • Secure identities and access using Azure Active Directory.

 

WHY SHOULD I ATTEND?

This course is designed for security analysts, security engineers, and security operations personnel who are responsible for implementing and maintaining security controls, monitoring and investigating security incidents, and developing incident response plans. It is also suitable for IT professionals who are interested in learning about security operations concepts and practices. Participants should have a basic understanding of Microsoft Azure and Microsoft 365 technologies.

Training Schedule:

 

Module 1: Security Operations Concepts and Techniques

  • Security operations overview
  • Common security operations tasks and techniques
  • Developing a security operations plan

Module 2: Security Incident Response

  • Developing a security incident response plan
  • Security incident investigation techniques
  • Incident response reporting and communication

Module 3: Threat Protection Technologies

  • Introduction to threat protection technologies
  • Implementing threat protection technologies
  • Monitoring and responding to security incidents using Microsoft 365 Defender

Module 4: Vulnerability Management

  • Developing and implementing a vulnerability management program
  • Identifying and remediating vulnerabilities
  • Reporting on vulnerability management progress

Module 5: Identity and Access Management

  • Azure Active Directory overview
  • Implementing identity and access management using Azure Active Directory

 

Share This Event

  • This event has passed.

Details

Venue

التسجيل وطلب البرامج



استجابة خلال 24 ساعة

تُعقد هذه الدورة في مدن وأوقات مختلفة. يمكنك طلبها عبر نموذج التسجيل أدناه. سيقوم فريقنا بمعالجة طلبك خلال 24 ساعة.



  • تصميم برامج مخصّصة حسب احتياجك المؤسسي.

  • تنسيق مرن للمواعيد والمدن (مدريد، لندن، وغيرها).

للتسجيل وطلب البرامج المتاحة أو المخصصة، يرجى استخدام النموذج التالي.

For registration and to request available or customized programs, please use the form below. Our team will prepare your request within 24 hours.


Please enable JavaScript in your browser to complete this form.
Name الاسم

Prefer direct assistance? Reach us via email or WhatsApp.