Microsoft Authorised Training Partner — Flexible team programs across Australia, New Zealand & Singapore. Book a Discovery Call →
Security & Compliance Track • Intermediate

SC-200: Security Operations Analyst
Detect, Investigate, and Respond to Threats

SC-200 is a 4-day, live instructor-led course that trains your security operations team to defend against cyber threats using Microsoft Sentinel, Microsoft Defender XDR, and Kusto Query Language (KQL). Your team learns to triage incidents, hunt for adversaries, and build automated response workflows — delivered by Microsoft Certified Trainers with hands-on labs in real security environments.

No commitment  •  Free 30-min call  •  Microsoft Certified Trainers

Course Snapshot
📋
Course
SC-200: Security Operations Analyst
🕰
Duration
4 Days
🎬
Delivery
Live Instructor-Led • Virtual or Onsite
🎓
Level
Intermediate • Security Fundamentals Required
🏆
Certification
Microsoft Certified: Security Operations Analyst Associate
🧪
Learn By Doing
Guided Hands-On Labs (Open for 180 days)
Book Discovery Call →

Bespoke at a Glance

40,050+
Learners trained since 2013
9,600+
Client organisations
13+ Years
Authorised training partner
MCT
Microsoft Certified Trainers
ANZ + SG
Australia, NZ & Singapore
Trusted by teams at
Telstra NAB Macquarie Xero AGL Australian Taxation Office Versent
Commonwealth Superannuation Corporation Healthdirect Australia NZQA Inland Revenue NZ MetService NZ Department for Housing and Urban Development ANC

You're Paying for Microsoft Security Tools.
Is Anyone Using Them?

You've invested in Microsoft Sentinel and Defender XDR, but alerts pile up, incidents go uninvestigated, and your team is firefighting instead of threat hunting. The tools are powerful — but only if your people know how to use them.

Alert Fatigue Is Winning

Your SOC is drowning in alerts they can't prioritise. Without properly tuned analytics rules and detection logic, every notification looks the same — and the real threats hide in the noise. Your team needs the KQL skills and Sentinel knowledge to separate signal from noise.

Incidents Take Too Long to Resolve

When a real incident hits, your team scrambles across multiple consoles, manually correlating data from Defender, Sentinel, and Entra ID. Without a structured investigation workflow and the unified security operations platform, mean time to respond stays unacceptably high.

Threat Hunting Is Aspirational

Your team knows they should be proactively hunting for threats, but they don't have the KQL skills or Sentinel expertise to do it. They're stuck in reactive mode — waiting for alerts instead of finding adversaries before damage is done.

Who Is SC-200 Designed For?

SC-200 is for security professionals who monitor, detect, investigate, and respond to threats across Microsoft environments. Basic security and Azure familiarity is required.

🛡

SOC Analysts (Tier 1-3)

Level up from basic triage to advanced investigation and threat hunting. Learn to use KQL, Sentinel analytics, and Defender XDR to detect, investigate, and respond to threats faster and more accurately.

🔍

Threat Hunters

Build the KQL fluency and Sentinel expertise to proactively hunt for adversaries across your environment. Learn hypothesis-driven hunting techniques and build custom detection rules.

🔧

Security Engineers

Configure and tune Microsoft Sentinel, Defender XDR, and Defender for Cloud to work as a unified security operations platform. Build the detection engineering skills that underpin an effective SOC.

📋

Incident Responders

Master structured investigation workflows across the Microsoft security stack. Learn to correlate signals from endpoints, identities, email, and cloud apps into a single incident timeline.

🎯

Security Team Leads

Set detection and response standards for your SOC. Gain the depth to evaluate analytics rules, review investigation workflows, and drive continuous improvement in your security operations practice.

Cloud Security Analysts

Extend your security monitoring to multi-cloud and hybrid environments. Learn how Defender for Cloud and Sentinel work together to detect threats across Azure, AWS, GCP, and on-premises infrastructure.

What We Cover in SC-200

The SC-200 curriculum follows Microsoft's official 10 learning paths. Your team gets a structured walkthrough of every security operations domain — delivered by a Microsoft Certified Trainer.

Learning Path 1

Mitigate Threats Using Microsoft Defender XDR

6 Modules
  • Introduction to Microsoft Defender XDR threat protection
  • Mitigate incidents using Microsoft Defender XDR
  • Remediate risks with Microsoft Defender for Office 365
  • Microsoft Defender for Identity
  • Microsoft Defender for Cloud Apps
  • Respond to data loss prevention alerts using Microsoft 365
Learning Path 2

Mitigate Threats Using Microsoft Security Copilot

5 Modules
  • Fundamentals of Microsoft Security Copilot
  • Describe how Microsoft Security Copilot processes prompt requests
  • Describe the core features of Microsoft Security Copilot
  • Describe the embedded experiences of Microsoft Security Copilot
  • Explore standalone experiences of Microsoft Security Copilot
Learning Path 3

Mitigate Threats Using Microsoft Purview

4 Modules
  • Respond to data loss prevention alerts using Microsoft 365
  • Manage insider risk in Microsoft Purview
  • Search and investigate with Microsoft Purview Audit
  • Investigate threats with Content search in Microsoft Purview
Learning Path 4

Mitigate Threats Using Microsoft Defender for Endpoint

6 Modules
  • Protect against threats with Microsoft Defender for Endpoint
  • Deploy the Microsoft Defender for Endpoint environment
  • Implement Windows security enhancements
  • Perform device investigations
  • Perform actions on a device
  • Perform evidence and entities investigations
Learning Path 5

Mitigate Threats Using Microsoft Defender for Cloud

6 Modules
  • Plan for cloud workload protections using Microsoft Defender for Cloud
  • Workload protections in Microsoft Defender for Cloud
  • Connect Azure assets to Microsoft Defender for Cloud
  • Connect non-Azure resources to Microsoft Defender for Cloud
  • Manage your cloud security posture management
  • Remediate security alerts using Microsoft Defender for Cloud
Learning Path 6

Create Queries Using Kusto Query Language (KQL)

4 Modules
  • Construct KQL statements for Microsoft Sentinel
  • Analyze query results using KQL
  • Build multi-table statements using KQL
  • Work with string data using KQL statements
Learning Path 7

Configure Your Microsoft Sentinel Environment

6 Modules
  • Introduction to Microsoft Sentinel
  • Create and manage Microsoft Sentinel workspaces
  • Query logs in Microsoft Sentinel
  • Use watchlists in Microsoft Sentinel
  • Utilize threat intelligence in Microsoft Sentinel
  • Integrate Microsoft Defender XDR with Microsoft Sentinel
Learning Path 8

Connect Logs to Microsoft Sentinel

7 Modules
  • Connect data to Microsoft Sentinel using data connectors
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Microsoft Defender XDR to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Connect Common Event Format logs to Microsoft Sentinel
  • Connect Syslog data sources to Microsoft Sentinel
  • Connect threat indicators to Microsoft Sentinel
Learning Path 9

Create Detections & Perform Investigations

8 Modules
  • Threat detection with Microsoft Sentinel analytics
  • Threat response with Microsoft Sentinel playbooks
  • Security incident management in Microsoft Sentinel
  • Identify threats with Behavioral Analytics
  • Data normalization in Microsoft Sentinel
  • Query, visualize, and monitor data in Microsoft Sentinel
  • Manage content in Microsoft Sentinel
  • Explain threat intelligence concepts
Learning Path 10

Perform Threat Hunting in Microsoft Sentinel

4 Modules
  • Explain threat hunting concepts in Microsoft Sentinel
  • Threat hunting with Microsoft Sentinel
  • Use Search jobs in Microsoft Sentinel
  • Hunt for threats using notebooks in Microsoft Sentinel

What Your Team Walks Away With

After four days of hands-on security operations training, your team returns to work ready to detect, investigate, and respond — not just monitor dashboards.

🔍

Write KQL That Finds Real Threats

Your team will write detection queries, investigation queries, and hunting queries in KQL — the skill that separates effective SOC analysts from dashboard watchers. They'll know the operators, the tables, and the patterns.

Resolve Incidents Faster

Structured investigation workflows across the unified security operations platform. Your team learns to correlate signals from Defender XDR, Sentinel, and Entra ID into a single incident timeline — cutting mean time to respond.

🎯

Hunt for Threats Proactively

Move from reactive to proactive security. Your team learns hypothesis-driven hunting using Sentinel, MITRE ATT&CK mapping, and advanced KQL techniques that find adversaries before they trigger alerts.

🏆

Earn a Microsoft Certification

The Security Operations Analyst Associate certification validates your team's ability to detect, investigate, and respond to threats using Microsoft's security platform — recognised across the industry.

🔄

Tune Detections That Actually Work

Configure Sentinel analytics rules, custom detections, and alert thresholds that surface real threats and suppress false positives. End alert fatigue by building detection logic that your SOC can trust.

🧪

Learn By Doing — Not Just Watching

Each program includes guided hands-on labs in a live sandbox environment. Your team doesn't just hear about Azure services — they use them, guided by a Microsoft Certified Trainer in real time. Labs remain open for 180 days for sharpening those technical skills.

Ready to Transform Your Security Operations?

Book a free 30-minute discovery call. We'll assess your team's current SOC maturity and design a training program that closes the skills gaps that matter most.

Book Your Free Discovery Call →

Delivered by Microsoft Certified Trainers

Every Bespoke trainer holds active Microsoft Certified Trainer (MCT) status and brings real-world security operations experience — not just slides and theory.

🎯

MCT-Certified Instructors

All trainers hold current Microsoft Certified Trainer status with active security certifications. They bring SOC experience and threat hunting expertise from enterprise environments.

🏢

Private, Team-Based Delivery

Every session is delivered exclusively for your team. Your trainer tailors threat scenarios, KQL examples, and detection rules to your industry, environment, and threat landscape.

🌐

Virtual or Onsite — Your Choice

Attend live from anywhere in Australia, New Zealand, or Singapore via our virtual classroom. Or book onsite delivery at your office. Same quality, same trainer, same outcome.

🧪

Learn By Doing

Every program includes guided hands-on labs in a live sandbox environment. Your team builds real skills by working with actual Azure services — not just watching slides and demos.

What Our Clients Say

Bespoke has been the authorised AWS and Microsoft cloud training partner for Australia and New Zealand since 2013 — delivering Microsoft and AWS programs for teams that take capability seriously.

“Our people are our point of difference, so it's critical we partner with organisations that deliver exceptional learning experiences. Bespoke has been a key enabler when it comes to developing cloud expertise.”

— Hannah Ryan, Versent

“Bespoke played a vital role in designing customised learning paths for our technology workforce. Expert instructors greatly enhanced the learning experience.”

— L&D Specialist, REA Group

“Bespoke helped us establish tailored learning pathways for our technical staff. 95% of our team expressed interest in certification — they helped us meet our goals.”

— L&D Manager, Infomedia

“Great content delivered by a highly competent trainer. The labs were well planned and the hands-on learning made the content immediately applicable.”

— Cloud Engineer

“This course helped solidify and expand on existing knowledge. A great overview for anyone looking to understand how everything ties together.”

— Platform Engineer

Your Azure Security Certification Pathway

SC-200 is the security operations certification. Build on your security engineering foundation from AZ-500 to master detection, investigation, and threat hunting.

Security Engineering

AZ-500

Azure Security Engineer Associate

View Course →
You Are Here

SC-200

Security Operations Analyst

More Than Just a Course

Every Bespoke training engagement includes value-added services that set us apart from standard providers.

📧

30-Day Post-Training Support

Your team gets email access to our operational support team for 30 days after the course. Real questions, real answers, as they apply skills on the job.

📝

Certification Study Resources

Curated Microsoft Learn pathways, practice exams, and KQL reference guides included. Everything your team needs to pass the SC-200 certification exam with confidence.

💻

Lab Environment Access

Extended access to security lab environments so your team can continue practising KQL queries and Sentinel configurations after the course ends.

🔄

Custom Threat Scenarios

Your trainer adapts threat scenarios, detection rules, and hunting exercises to your industry and threat landscape — so learning transfers directly to your SOC operations.

🔍

Free Skills Gap Assessment

Before the course, we assess where your SOC team stands. After, we recommend what's next. You get a clear security operations progression path — not a one-off transaction.

👤

Dedicated Account Manager

A single point of contact handles scheduling, logistics, and follow-up. From booking to certification, your experience is managed end to end.

Frequently Asked Questions

Everything you need to know about SC-200 Security Operations Analyst training with Bespoke.

SC-200 is a 4-day (approximately 32-hour) live instructor-led course. It's delivered by a Microsoft Certified Trainer, so your team can attend virtually from anywhere in Australia, New Zealand, or Singapore — or we can deliver onsite at your office.

SC-200 requires a basic understanding of Microsoft 365, Azure security fundamentals, and networking concepts. Experience with KQL is helpful but not required — the course teaches it from the ground up. We recommend AZ-500 or equivalent Azure security knowledge as a foundation.

Certification exam vouchers can be included as part of your team program. We'll discuss the right approach during your discovery call — some teams want everyone to certify, others focus on building operational capability first.

AZ-500 focuses on securing Azure infrastructure — identity, networking, compute, and data protection. SC-200 focuses on security operations — detecting threats, investigating incidents, and hunting for adversaries using Microsoft Sentinel and Defender XDR. They're complementary certifications that many security teams pursue together.

Yes — KQL is a core component. You'll learn to write detection rules, investigation queries, and hunting queries using KQL. It's the query language that powers Microsoft Sentinel, Defender XDR, and Defender for Cloud — and it's the most in-demand skill for security operations roles.

Yes. SC-200 covers the unified security operations platform that integrates Microsoft Sentinel with Defender XDR, giving your SOC team a single-pane-of-glass view across endpoints, identities, email, cloud apps, and cloud workloads. This is the future of Microsoft security operations.

Pricing depends on team size, delivery format (virtual or onsite), and whether you include certification exam vouchers. Every engagement is tailored. Book a free 30-minute discovery call and we'll provide a quote based on your specific requirements — no obligation.

Absolutely — that's how we deliver. All Bespoke courses are private, team-based sessions. Your trainer tailors threat scenarios, detection rules, and KQL exercises to your environment and threat landscape. Minimum team size is 5.

Book a free 30-minute discovery call. We'll discuss your team's security operations maturity, assess readiness for SC-200, and build a training plan together. No pressure, no hard sell — just practical advice.

Ready to Build a World-Class SOC?

Book a free 30-minute discovery call with Trent. We'll assess your team's security operations maturity and design a training program that delivers real detection and response capability.

Book Your Discovery Call →

No commitment  •  Free 30-min call  •  Tailored to your team