A Security Operations Analyst (SOC Analyst) is responsible for monitoring and analyzing security events within an organization's IT infrastructure. They detect and respond to security incidents, investigate alerts, and assess potential threats to mitigate risks effectively. SOC analysts use security monitoring tools and technologies to monitor network traffic, detect anomalies, and identify malicious activity. They collaborate with incident response teams to contain and remediate security incidents, maintain security documentation and reports, and implement security best practices and procedures. This role requires strong analytical skills, knowledge of cybersecurity threats and vulnerabilities, and the ability to work under pressure to protect organizational assets from cyber threats.
Learning Path
SC-200: Perform threat hunting in Microsoft Sentinel
2 hours
intermediate
Threat Protection
Learning Path
Implement security through a pipeline using Azure DevOps
7 hours
intermediate
Devops · Cloud Computing
Learning Path
SC-200: Create detections and perform investigations using Microsoft Sentinel
6 hours
intermediate
Threat Protection
Learning Path
Enhance endpoint security with Microsoft Intune and Microsoft Copilot for Security
1 hour
beginner
Asset Management · Cloud Computing
Learning Path
AZ-400: Implement security and validate code bases for compliance
1 hour
advanced
Compliance
Learning Path
SC-200: Configure your Microsoft Sentinel environment
2 hours
intermediate
Threat Protection
Learning Path
DevOps foundations: The core principles and practices
3 hours
beginner
Devops · Cloud Computing
Learning Path
SC-200: Mitigate threats using Microsoft Defender for Cloud
4 hours
intermediate
Compliance · Threat Protection
Learning Path
Analyze monitoring data with Kusto Query Language
3 hours
beginner · intermediate · advanced
Cloud Computing · Data Analytics
Learning Path
Get started with Microsoft Copilot for Security
7 hours
beginner
Security · Artificial Intelligence
Learning Path
Data analysis with Kusto Query Language
2 hours
beginner · intermediate · advanced
Data Analytics · Data Management
Learning Path
SC-200: Mitigate threats using Microsoft Copilot for Security
3 hours
intermediate
Cloud Security · Security
Learning Path
SC-200: Connect logs to Microsoft Sentinel
2 hours
intermediate
Cloud Security
Learning Path
AZ-400: Implement continuous feedback
3 hours
advanced
Change Management · Devops
Learning Path
AZ-400: Manage infrastructure as code using Azure and DSC
3 hours
advanced
Architecture · Cloud Computing
Learning Path
AZ-400: Design and implement a release strategy
7 hours
advanced
Change Management
Learning Path
AZ-400: Implement a secure continuous deployment using Azure Pipelines
3 hours
advanced
Cloud Computing · Data Engineering
Learning Path
AZ-400: Design and implement a dependency management strategy
2 hours
advanced
Change Management · Devops
Learning Path
AZ-400: Implement CI with Azure Pipelines and GitHub Actions
6 hours
advanced
No core subjects
Learning Path
AZ-400: Development for enterprise DevOps
6 hours
advanced
Devops
Learning Path
Data analysis in Azure Data Explorer with Kusto Query Language
4 hours
beginner · intermediate · advanced
Data Analytics
Learning Path
Configure SIEM security operations using Microsoft Sentinel
4 hours
intermediate
Threat Protection
Learning Path
SC-200: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
2 hours
intermediate
Threat Protection · Data Analytics
Learning Path
SC-200: Mitigate threats using Microsoft Defender XDR
5 hours
intermediate
Cloud Security · Security
Learning Path
SC-200: Mitigate threats using Microsoft Purview
3 hours
intermediate
Compliance · Information Protection Governance
Learning Path
SC-200: Mitigate threats using Microsoft Defender for Endpoint
5 hours
intermediate
Compliance · Device Management
Learning Path
Learn how Microsoft supports cloud adoption as part of a cybersecurity solution
0 hours
beginner
Cloud Computing · Cloud Security
Learning Path
Protect on-premises identities with Microsoft Defender for Cloud for Identity
0 hours
beginner
Cloud Security · Threat Protection
Learning Path
Empower your workforce with Copilot for Microsoft 365 Use Cases
6 hours
beginner
Artificial Intelligence · Business Applications
Learning Path
Learn how Microsoft supports secure software development as part of a cybersecurity solution
5 hours
beginner
Threat Protection
Learning Path
Learn how Microsoft supports data discovery, classification, and protection as part of a cybersecurity solution
4 hours
beginner
Information Protection Governance
Learning Path
Learn how Microsoft supports using multifactor authentication as part of a cybersecurity solution
2 hours
beginner
Security