Course data sheet
Defend against cyberthreats with Microsoft's security operations platform (SC-200T00)
H9P86S
Table of Contents
Overview
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and MicrosoftDefender for Cloud. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
-
The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender XDR, Microsoft Defender for Cloud, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.
-
After completing this course, you should be able to:
- Protect data within Microsoft 365 collaboration environments from internal and external threats
- Manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases
- Protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments
| Module 1: Implement Microsoft Purview Information Protection |
|
| Module 2: Implement and Manage Microsoft Purview Data Loss Prevention |
|
| Module 3: Implement and Manage Microsoft Purview Insider Risk Management |
|
| Module 4: Protect Data in AI Environments |
|
| Module 5: Implement and Manage Retention and Recovery |
|
| Module 6: Audit & Search Activity |
|
5 reasons to choose HPE as your training partner
- Learn HPE and in-demand IT industry technologies from expert instructors.
- Build career-advancing power skills.
- Enjoy personalized learning journeys aligned to your company’s needs.
- Sharpen your skills with access to real environments in virtual labs .
Explore our simplified purchase options, including HPE Education Services – Learning Credits .
© Copyright 2026 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
All third-party marks are property of their respective owners.
a50014939enw, H9P86S A.01, February 2026