
Microsoft Security Operations Analyst Training . ©
The Goals
The Microsoft Security Operations Analyst training is designed to provide learners with a comprehensive understanding of security operations concepts and practices. By the end of this course, participants should be able to:
- Understand security operations concepts and techniques.
- Develop and implement a security incident response plan.
- Use various tools and techniques to identify and investigate security incidents.
- Analyze and report on security incidents.
- Implement threat protection technologies to prevent future security incidents.
- Use Microsoft 365 Defender to monitor and respond to security incidents.
- Develop and implement a vulnerability management program.
- Secure identities and access using Azure Active Directory.
WHY SHOULD I ATTEND?
This course is designed for security analysts, security engineers, and security operations personnel who are responsible for implementing and maintaining security controls, monitoring and investigating security incidents, and developing incident response plans. It is also suitable for IT professionals who are interested in learning about security operations concepts and practices. Participants should have a basic understanding of Microsoft Azure and Microsoft 365 technologies.
Training Schedule:
Module 1: Security Operations Concepts and Techniques
- Security operations overview
- Common security operations tasks and techniques
- Developing a security operations plan
Module 2: Security Incident Response
- Developing a security incident response plan
- Security incident investigation techniques
- Incident response reporting and communication
Module 3: Threat Protection Technologies
- Introduction to threat protection technologies
- Implementing threat protection technologies
- Monitoring and responding to security incidents using Microsoft 365 Defender
Module 4: Vulnerability Management
- Developing and implementing a vulnerability management program
- Identifying and remediating vulnerabilities
- Reporting on vulnerability management progress
Module 5: Identity and Access Management
- Azure Active Directory overview
- Implementing identity and access management using Azure Active Directory
التسجيل وطلب البرامج
استجابة خلال 24 ساعة
تُعقد هذه الدورة في مدن وأوقات مختلفة. يمكنك طلبها عبر نموذج التسجيل أدناه. سيقوم فريقنا بمعالجة طلبك خلال 24 ساعة.
-
تصميم برامج مخصّصة حسب احتياجك المؤسسي. -
تنسيق مرن للمواعيد والمدن (مدريد، لندن، وغيرها).
للتسجيل وطلب البرامج المتاحة أو المخصصة، يرجى استخدام النموذج التالي.
For registration and to request available or customized programs, please use the form below. Our team will prepare your request within 24 hours.
Prefer direct assistance? Reach us via email or WhatsApp.

