0.1 Mission and Course Blueprint
Mission
This course teaches you to investigate security incidents in Microsoft 365 environments using the tools, data sources, and query language that production SOC teams use daily. By the end, you will be able to detect credential phishing, trace account compromise through sign-in logs, contain active threats, build detection rules, and write incident reports — the complete workflow of a Microsoft security operations analyst.
The course is mapped to every objective on the SC-200 (Microsoft Security Operations Analyst) certification exam, January 2026 update. It is not an exam cram. It teaches the skills the exam tests, in the context of real investigation scenarios, so that passing the exam is a side effect of genuine competence.
Course Blueprint
The course is organized into five phases. Each phase builds on the previous one.
Phase 1 is completely free
Modules 0 through 4 require no account, no payment, and no email. Read them, run the queries, complete the exercises. If the depth and quality convince you the paid content is worth it, subscribe. If not, you still learned KQL and sign-in log investigation for free.
How the phases connect
Phase 1 teaches the language (KQL) and the data (sign-in logs, email events, device telemetry). Phase 2 teaches how to configure the tools that generate that data. Phase 3 is the core — complete investigation scenarios where you use everything from Phases 1 and 2 to investigate real attacks. Phase 4 teaches proactive hunting and automation for analysts who want to go beyond reactive investigation.
You can enter at any phase if you already have the prerequisite skills. But the course is designed to be taken in order — each module references concepts and queries from earlier modules.