Defend against cyberthreats with Microsoft's security operations platform(SC-200) Training in Spain

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 4 Days
  • Price: From €3,373+VAT
  • UK Based Global Training Provider
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and Microsoft Defender for Cloud.

In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.



Who Should Attend?

The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender XDR, Microsoft Defender for Cloud, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.

We can organize this training at your preferred date and location. Contact Us!

What You Will Learn

Students will learn to,

  • SC-200: Mitigate threats using Microsoft Defender XDR
  • SC-200: Mitigate threats using Microsoft Security Copilot
  • SC-200: Mitigate threats using Microsoft Purview
  • SC-200: Mitigate threats using Microsoft Defender for Endpoint
  • SC-200: Mitigate threats using Microsoft Defender for Cloud
  • SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
  • SC-200: Configure your Microsoft Sentinel environment
  • SC-200: Connect logs to Microsoft Sentinel
  • SC-200: Create detections and perform investigations using Microsoft Sentinel
  • SC-200: Perform threat hunting in Microsoft Sentinel

Training Outline

Module 1 : SC-200: Mitigate threats using Microsoft Defender XDR

  • Introduction to Microsoft Defender XDR threat protection
  • Mitigate incidents using Microsoft Defender
  • Remediate risks with Microsoft Defender for Office 365
  • Manage Microsoft Entra Identity Protection
  • Safeguard your environment with Microsoft Defender for Identity
  • Secure your cloud apps and services with Microsoft Defender for Cloud Apps

Module 2 : SC-200: Mitigate threats using Microsoft Security Copilot

  • Introduction to generative AI and agents
  • Describe Microsoft Security Copilot
  • Describe the core features of Microsoft Security Copilot
  • Describe the embedded experiences of Microsoft Security Copilot
  • Explore use cases of Microsoft Security Copilot

Module 3 : SC-200: Mitigate threats using Microsoft Purview

  • Investigate and respond to Microsoft Purview Data Loss Prevention alerts
  • Investigate insider risk alerts and related activity
  • Search and investigate with Microsoft Purview Audit
  • Search for content with Microsoft Purview eDiscovery

Module 4 : SC-200: Mitigate threats using Microsoft Defender for Endpoint

  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Implement Windows security enhancements with Microsoft Defender for Endpoint
  • Perform device investigations in Microsoft Defender for Endpoint
  • Perform actions on a device using Microsoft Defender for Endpoint
  • Perform evidence and entities investigations using Microsoft Defender for Endpoint
  • Configure and manage automation using Microsoft Defender for Endpoint
  • Configure for alerts and detections in Microsoft Defender for Endpoint
  • Utilize Vulnerability Management in Microsoft Defender for Endpoint

Module 5 : SC-200: Mitigate threats using Microsoft Defender for Cloud

  • Plan for cloud workload protections using Microsoft Defender for Cloud
  • Connect Azure assets to Microsoft Defender for Cloud
  • Connect non-Azure resources to Microsoft Defender for Cloud
  • Manage your cloud security posture management
  • Explain cloud workload protections in Microsoft Defender for Cloud
  • Remediate security alerts using Microsoft Defender for Cloud

Module 6 : SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

  • Construct KQL statements for Microsoft Sentinel
  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with data in Microsoft Sentinel using Kusto Query Language

Module 7 : SC-200: Configure your Microsoft Sentinel environment

  • Introduction to Microsoft Sentinel
  • Create and manage Microsoft Sentinel workspaces
  • Query logs in Microsoft Sentinel
  • Use watchlists in Microsoft Sentinel
  • Utilize threat intelligence in Microsoft Sentinel
  • Integrate Microsoft Defender XDR with Microsoft Sentinel

Module 8 : SC-200: Connect logs to Microsoft Sentinel

  • Connect data to Microsoft Sentinel using data connectors
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Microsoft Defender XDR to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Connect Common Event Format logs to Microsoft Sentinel
  • Connect syslog data sources to Microsoft Sentinel
  • Connect threat indicators to Microsoft Sentinel

Module 9: SC-200: Create detections and perform investigations using Microsoft Sentinel

  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Threat response with Microsoft Sentinel playbooks
  • Security incident management in Microsoft Sentinel
  • Identify threats with Behavioral Analytics
  • Data normalization in Microsoft Sentinel
  • Query, visualize, and monitor data in Microsoft Sentinel
  • Manage content in Microsoft Sentinel

Module 10: SC-200: Perform threat hunting in Microsoft Sentinel

  • Explain threat hunting concepts in Microsoft Sentinel
  • Threat hunting with Microsoft Sentinel
  • Use Search jobs in Microsoft Sentinel
  • Hunt for threats using notebooks in Microsoft Sentinel

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Defend against cyberthreats with Microsoft's security operations platform(SC-200) Training in Spain. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including Spain, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Defend against cyberthreats with Microsoft's security operations platform(SC-200) Training in Spain. Our hand-picked classroom venues in Spain offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginç IT Academy’s Onsite Defend against cyberthreats with Microsoft's security operations platform(SC-200) Training in Spain. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Spain has rapidly transformed into one of Europe's most vibrant technology ecosystems, with Madrid, Barcelona, and Valencia emerging as major global innovation hubs. The country is home to prestigious institutions like the Polytechnic University of Catalonia and IE Business School, which fuel the growth of sectors ranging from telecommunications to renewable energy tech. As a leading destination for digital nomads and multinational tech headquarters, Spain prioritizes digital literacy and high-level software engineering skills. Our training programs in Spain are designed to support this flourishing market, providing certifications in Cloud Computing, Cybersecurity, and Data Science. We help professionals across the Iberian Peninsula stay ahead of industry trends and drive the digital transformation of Spain’s increasingly diversified and high-tech economy.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.