In this module

0.3 How to Learn from This Course

45 minutes · Module 0 · Free
Operational Objective
This subsection covers how to learn from this course — a core operational skill for security teams working in Microsoft 365 environments. Every concept is demonstrated through practical scenarios from the Northgate Engineering environment.
Deliverable: Working proficiency with the techniques and operational patterns covered in this subsection.
Estimated completion: 25 minutes
OPERATIONAL FLOW Input Process Analyse Decide Output

Figure 0.3 — Operational workflow from input through documented output.

Figure — How to Learn from This Course. Applied to security operations at Northgate Engineering.

How to Learn from This Course

This course is entirely text-based. No video. No audio. No live instructor. That is a deliberate design decision — but it requires you to learn differently than you would with a video course. This subsection teaches you how to extract maximum value from text-based technical training, and why this format actually produces better outcomes for security operations skills than video ever can.

Why text works better for technical security training

Video courses have a fundamental problem for security operations training: they age instantly. Microsoft updates the Defender XDR portal layout every few months. A video recorded showing the incident queue in January displays a navigation structure that does not exist by April. The instructor says "click the button in the upper right corner" and Microsoft moved it to a sidebar three weeks after recording. The instructor demonstrates a query against a table that Microsoft renamed in the latest update. The instructor shows a settings page that no longer exists because the feature was consolidated into a different blade.

Expand for Deeper Context

Text content with annotated diagrams updates in minutes. A description that says "navigate to Settings, then Endpoints, then Advanced features" remains accurate even when the exact pixel position of the navigation changes. KQL queries are version-independent — the query language specification does not change when Microsoft redesigns the portal chrome. Investigation methodology does not change when Microsoft renames a menu item. The concepts, the reasoning, and the queries in this course will remain valid long after the portal screenshots in any video course have become misleading.

The second advantage of text is precision. A video instructor explains a concept once, at one speed, with one level of detail. If you missed a nuance, you rewind and watch the same explanation again. Text lets you re-read a single sentence, study a single line of a KQL query, cross-reference a term with its definition three paragraphs earlier, or jump between two sections to compare related concepts. The cognitive load of processing technical information is lower when you control the pace completely.

The third advantage is reference usability. When you are investigating a real incident at 2am and need to remember how to write a cross-product correlation query, you do not want to scrub through a 45-minute video to find the 30-second segment where the instructor wrote the query. You want to search the text, find the query, read the annotation, and adapt it to your current scenario. This course is designed to be a working reference, not just a learning experience.

But text-based learning demands more active engagement from you. Video creates an illusion of learning through passive consumption — you watch an instructor click buttons and feel like you are learning. Text does not create that illusion. If you are not actively engaging with the material, you know immediately because you cannot follow the next paragraph. That honesty is an advantage, even though it feels harder.

The active learning approach

Read with your lab environment open. Every subsection from Module 1 onward assumes you have your M365 developer tenant and Sentinel workspace accessible. When you encounter a KQL query, do not just read it — open Advanced Hunting in your Defender portal and run it. When you encounter a portal navigation instruction ("navigate to Settings, then Endpoints, then Advanced features"), do not just read it — navigate there in your lab and observe the actual interface. The course teaches through doing, not through reading about doing. If you read without running, you retain approximately 10% of the material. If you read and run, you retain approximately 50%. If you read, run, and then modify the query to test a variation, you retain approximately 80%.

Build queries incrementally. Module 6 (KQL) and every subsequent module teach KQL by constructing queries one operator at a time. The course shows you the first line, explains why it exists, shows the output, then adds the next line and explains what changed. Your job is to type each line yourself in Advanced Hunting, run it, verify you get the expected output, and then type the next line. Do not copy-paste the final complete query — you miss the incremental understanding that makes you capable of writing your own queries from scratch.

When you type a query and get an error, that is learning. When you type a query and get unexpected results, that is learning. When you compare your output to the Expected Output block and notice a difference, that is learning. The frustration of debugging a query you typed wrong teaches you more about KQL syntax than successfully running ten queries you copied.

Attempt exercises before reading the solution. Every "Try it yourself" exercise has a reveal button that shows the solution. The learning happens in the attempt, not in reading the solution. Spend at least five minutes working through the exercise before clicking reveal. Write down your approach. If you are stuck, identify specifically what you do not know — "I do not know which table contains inbox rule data" is a concrete gap you can fill by reviewing the subsection. "I am stuck" is not actionable.

If you spend five minutes and genuinely cannot make progress, reveal the solution and study it carefully. Understand not just what the solution does, but why it works. Then close the solution, wait five minutes, and try to reproduce it from memory. If you cannot, you have identified a specific knowledge gap to address.

Answer quiz questions by reasoning, not pattern matching. The Check My Knowledge questions at the end of each module present scenarios. Before selecting an answer, articulate to yourself why you think each answer is correct or incorrect. The correct answer is correct for a specific technical reason. The incorrect answers are incorrect for specific technical reasons. If you cannot explain why the wrong answers are wrong, you do not fully understand the topic. This depth of reasoning is what the SC-200 exam requires — and more importantly, it is what real incident response requires.

How to pace yourself

Each module is substantial. Module 1 contains over 30,000 words of teaching content — comparable to a 100-page chapter in a technical textbook. Module 6 (KQL) contains over 20,000 words. These are not modules you complete in a single sitting. Attempting to rush through a module in one marathon session produces exhaustion, not learning.

Recommended pace by subsection, not by module. Each module contains 8-15 subsections. Treat each subsection as a single study session: read it, run the queries, attempt the exercises, answer the knowledge check questions if present, and stop. A single subsection takes 30-90 minutes depending on its depth and how many queries you run. Completing one subsection per day is a sustainable pace that produces consistent progress. Completing two subsections per day is ambitious but achievable for learners with dedicated study time.

At one subsection per day (five days per week), a 10-subsection module takes two weeks. The full 16-module course takes approximately 32 weeks — about eight months. At two subsections per day, the course takes approximately four months. At a weekend-only pace (four subsections per weekend), the course takes approximately ten months.

These estimates assume you are running every query and attempting every exercise. If you skip the hands-on components, you can read the course faster — but you will not have learned it.

Work through subsections sequentially within a module. Each subsection builds on the previous one. Jumping to subsection 1.8 (Cross-Product Correlation) before completing 1.4 (Defender for Endpoint Investigation) means you lack the entity pivoting skills that subsection 1.8 depends on. The course is a staircase — each step assumes you are standing on the one below it.

Take breaks between modules. After completing a module, take a day off from studying before starting the next one. Use that day to review your notes, run the Module Summary checklist, and identify any subsections where your understanding feels weak. Return to weak subsections and re-run the exercises before moving forward. Gaps in early modules compound in later modules.

Note-taking methodology

Take notes in your own words. After completing a subsection, write a 2-3 sentence summary of what you learned in your own words — not copied from the course, but rephrased in the way you would explain it to a colleague. If you cannot summarize the subsection without referring back to the text, you read it but did not learn it. Re-read, run the exercises again, and summarize.

Maintain a personal KQL reference. As you encounter useful query patterns, copy them into a personal reference document with annotations explaining when to use each pattern. By the time you complete the course, this personal reference will be more valuable than any public KQL cheat sheet because it contains the specific patterns you found most useful, annotated with your own understanding.

Track your investigation workflow. Module 1.7 (SOC Workflow) teaches a structured triage and investigation methodology. Write it down in your own words as a personal checklist. Each subsequent module will add steps and refinements to this workflow. By the time you complete the investigation modules (11-15), your personal checklist will be a complete investigation playbook customized to your understanding and your environment.

Spaced repetition for retention

Security operations knowledge decays without reinforcement. The query syntax you learned in Module 6 will fade if you do not use it for two months while working through other modules. The investigation methodology from Module 1 will become vague if you do not practice it.

Weekly review sessions. Dedicate 30 minutes per week to reviewing previous modules. Open Advanced Hunting and write one query from memory that you learned in a previous module. If you cannot write it from memory, review the relevant subsection. The goal is not to memorize every query — it is to maintain fluency with the patterns so you can reconstruct any query when needed.

Monthly full-practice exercises. Once per month, open your lab environment and simulate a complete investigation. Use the data in your tenant to practice: write a query to find anomalous sign-ins, trace the sign-in to specific user activity, check for post-compromise indicators (inbox rules, file downloads), and document your findings as if writing an incident report. This end-to-end practice reinforces the cross-product investigation skills that are the course's core value.

The learning components

Every subsection uses a consistent set of teaching components. Understanding what each one does and how to engage with it maximizes your learning efficiency.

Narrative teaching is the prose explanation of concepts, including worked reasoning and operational context. This is not filler — it contains the WHY behind every configuration decision and investigation step. The narrative explains not just what a feature does, but when to use it, what happens if you configure it wrong, and how it connects to other features. Read it carefully. Do not skim to the query blocks.

KQL query blocks are executable queries you run in your lab. Every query includes line-by-line explanation of what each operator does. The queries are designed to be typed, not copy-pasted, to build your KQL muscle memory. Each query block uses sql syntax highlighting (Hugo's Chroma highlighter does not have a KQL mode, so SQL highlighting provides the closest visual result).

Expected Output blocks show sample query results with a "What to look for" annotation. These teach you to read query results like an analyst — not just confirm the query ran successfully, but understand what the data reveals about the security scenario. The output values are fictional but realistic. Your lab output will have different values but the same column structure.

Try it yourself exercises are hands-on tasks with a hidden solution. The solution is behind a reveal button. These are where the deepest skill formation happens — the gap between reading about a technique and actually performing it. Always attempt before revealing.

Callout boxes provide context in four categories. Key callouts (orange border) highlight critical concepts you must understand. Warning callouts (red border) identify common mistakes, misconfigurations, or dangerous actions. Remember callouts (blue border) flag important details to retain. Tip callouts (green border) provide practical advice that improves your efficiency.

SC-200 exam callouts appear when a subsection covers a specific exam objective. They identify the domain, the specific skill measured, and where else in the course that skill is covered. Use these for targeted exam review.

Knowledge check questions test application, not recall. They present scenarios and ask what you would do. The feedback for each answer explains not just why the correct answer is correct, but why each incorrect answer is wrong. Study the feedback even for questions you answered correctly — the explanations often contain additional context that deepens your understanding.

What to do when you are stuck

Getting stuck is normal and expected. Technical material at this depth has concepts that require multiple exposures before they click. If you find yourself stuck, work through these steps in order:

Re-read the current subsection from the beginning. Technical content often requires two passes. The first pass builds a structural understanding of the topic. The second pass fills in the details that did not register on the first pass. Many learners report that concepts that were confusing on the first read became clear on the second read — not because the text changed, but because the structural context from the first read provided the scaffolding for detailed comprehension on the second.

Run the query or exercise in your lab. Seeing real output in your own environment is worth more than re-reading the explanation. If the course describes a process tree showing winword.exe → cmd.exe → powershell.exe and you cannot visualize what that looks like, opening the device timeline in your lab and looking at actual process events makes it concrete. Abstractions become concrete through interaction.

Check the Expected Output block. If your query returned different results than the Expected Output, the "What to look for" annotation often explains common variations and their causes. If your query returned an error, check for typos — KQL is case-sensitive for table and column names. The most common errors are misspelled table names, incorrect column names (DeviceName vs DeviceId), and missing pipe operators between query lines.

Review the previous subsection. If the current subsection assumes knowledge from the previous one, you may have a comprehension gap from earlier. Go back, re-read, re-run the exercises, and return to the current subsection. This is not failure — it is exactly how progressive learning works.

Search the Microsoft documentation. For specific portal navigation questions, configuration steps, or feature details, the Microsoft Learn documentation at learn.microsoft.com is a reliable reference. The course teaches investigation methodology and operational judgment. Microsoft Learn documents the exact current state of each product feature. The two are complementary.

Do not move forward until you understand the current subsection. The course is progressive — gaps compound. If you do not understand how where and summarize work in Module 6, every query in Module 1 will be opaque. If you do not understand the incident queue in Module 1, the investigation scenarios in Modules 11-15 will be incomprehensible. It is better to spend an extra day on a difficult subsection than to carry a gap into every subsequent module.

Compliance Myth: "The Secure Score tells you how secure you are"

The myth: The Secure Score tells you how secure you are

The reality: Secure Score measures configuration compliance against Microsoft's recommended settings. It does not measure: whether your detection rules catch real attacks, whether your SOC can investigate an incident, whether your users recognize phishing, or whether your IR plan works under pressure. A tenant with a 95% Secure Score and no SOC is less secure than a tenant with a 70% Secure Score and a trained, practiced incident response team. Score is hygiene. Capability is security.

You are reading a module about Defender for Endpoint alert investigation. The module includes a KQL query with line-by-line annotation. You read the query and understand what each line does. Should you move to the next section?
Yes — understanding the query is the learning objective.
No. Reading a query and running a query are different skills. Open your Sentinel workspace (or the sample data environment), type the query yourself (do not copy-paste), run it, examine the output, and then modify it — change the time window, add a filter, or adjust the threshold. The modification step is where the learning happens: it forces you to understand the query well enough to change it, not just recognize it.
Only if the try-it exercise at the end covers the same query.
Yes — but bookmark the query for reference during the exam.
Decision point

You manage NE's M365 security stack. Microsoft releases a new Defender feature in preview. The feature promises to reduce AiTM risk by 80%. Do you enable it immediately?

Not in production. Enable in a test tenant or for a pilot group first. Preview features may: change behavior before GA, have undocumented interactions with existing CA policies, or produce unexpected results in specific tenant configurations. The deployment sequence: (1) enable in a test tenant and validate against NE's CA policy set, (2) enable for a pilot group of 10 users for 2 weeks, (3) monitor for FPs and operational impact, (4) roll out to all users after successful pilot. Microsoft's '80% reduction' claim is based on their telemetry across all tenants — NE's specific configuration may produce different results.

You've set up your M365 tenant and learned the Defender XDR unified portal.

Module 0 got your M365 developer tenant configured with sample data. Module 1 took you through the Defender XDR unified incident queue across endpoint, email, identity, and cloud apps. Now you investigate every major M365 attack type and deploy the detections that catch them next time.

  • 15 investigation and configuration modules — Defender for Endpoint, Purview, Defender for Cloud, Security Copilot, Sentinel workspace design, log ingestion, analytics rules, and threat hunting
  • 5 named attack investigations — AiTM credential phishing, BEC and financial fraud, consent phishing and OAuth grant abuse, token replay and session hijacking, insider threat
  • KQL from fundamentals through advanced hunting — dedicated modules on query language, cross-table joins, statistical analysis, and threat hunting queries
  • SC-200 exam objectives fully covered — every module maps to the January 2026 SC-200 update. The certification is the side effect of operational competence, not the goal
  • Production artefacts per module — detection rules, investigation playbooks, and hardening checklists you deploy to your own tenant
Unlock the full course with Premium See Full Syllabus