2026

2026 Goals and Objectives

This page tracks key cyber defense training goals and objectives for 2026. The focus of this section is Microsoft Defender for Endpoint, Microsoft security operations, and foundational Azure knowledge. Items are organized by priority and intended audience level.

Core Microsoft Defender for Endpoint Training

These modules support foundational and operational knowledge for analysts and team members working at the L1, L2, and long-term development levels.

Training ModuleLevelSourcePriority
Introduction to Microsoft Defender for EndpointL1 / L2 / LTMicrosoftMandatory
Investigate Alerts in Microsoft Defender XDRL1 / L2 / LTMicrosoftMandatory
Investigate Devices in Microsoft Defender for EndpointL1 / L2 / LTYouTubeMandatory
Device Actions in Microsoft Defender for EndpointL1 / L2 / LTYouTubeMandatory
Evidence and Entities InvestigationsL1 / L2 / LTYouTubeMandatory
User Account InvestigationsL1 / L2 / LTYouTubeMandatory
IP Address InvestigationsL1 / L2 / LTYouTubeMandatory
Domain InvestigationL1 / L2 / LTYouTubeMandatory

Long-Term Objectives

These learning paths and certifications support broader professional development and longer-range skill growth.

ObjectiveLevelSourceTimeline
SC-200 (Microsoft Certified: Security Operations Analyst Associate)L1 / L2 / LTMicrosoftLong-Term
SC-5001-A (Configure SIEM Security Operations Using Microsoft Sentinel)L1 / L2 / LTMicrosoftLong-Term
SC-5004 (Defend Against Cyber Threats with Microsoft Defender XDR)L2 / LTMicrosoftLong-Term
Microsoft Certified: Azure Fundamentals (AZ-900)Foundational / LTMicrosoftLong-Term

Azure Fundamentals Resources

Reference Materials

  • Investigate Alerts in Microsoft Defender XDR Source: Microsoft Learn
  • How to Investigate Devices in Microsoft Defender for Endpoint Source: YouTube
  • What Are Device Actions in Microsoft Defender for Endpoint Source: YouTube
  • Perform Evidence and Entities Investigations in Microsoft Defender for Endpoint Source: YouTube
  • How to Investigate a User Account in Microsoft Defender for Endpoint Source: YouTube
  • How to Investigate an IP Address in Microsoft Defender for Endpoint Source: YouTube
  • How to Investigate a Domain in Microsoft Defender for Endpoint Source: YouTube

Note: This page can be updated throughout the year as training modules are completed, revised, or expanded.

Introduction to Microsoft Defender for EndpointL1/L2/LTMicrosoftMandatory
Investigate alerts in Microsoft Defender XDRL1/L2/LTMicrosoftMandatory
Investigate Devices In MDEL1/L2/LTYouTubeMandatory
Device Actions in MDEL1/L2/LTYouTubeMandatory
Evidence & Entities InvestigationsL1/L2/LTYouTubeMandatory
User Account InvestigationsL1/L2/LTYouTubeMandatory
IP Address InvestigationsL1/L2/LTYouTubeMandatory
Domain InvestigationL1/L2/LTYouTubeMandatory
SC-200 (Microsoft Certified: Security Operations Analyst Associate)L1/L2/LTMicrosoftLong term
SC-5001-A (Configure SIEM security operations using Microsoft Sentinel)L1/L2/LTMicrosoftLong term
SC-5004 (Defend Against Cyber Threats with Microsoft Defender XDR)L2/LTMicrosoftLong term
Investigate alerts in Microsoft Defender XDRMicrosoftInvestigate alerts in Microsoft Defender XDR – Microsoft Defender XDR | Microsoft Learn
HOW TO INVESTIGATE THE DEVICES IN MICROSOFT DEFENDER FOR ENDPOINTYouTubeHOW TO INVESTIGATE THE DEVICES IN MICROSOFT DEFENDER FOR ENDPOINT
WHAT ARE DEVICE ACTIONS IN MICROSOFT DEFENDER FOR ENDPOINTYouTubeWHAT ARE DEVICE ACTIONS IN MICROSOFT DEFENDER FOR ENDPOINT
PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINTYouTubePERFORM EVIDENCE AND ENTITIES INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT
HOW TO INVESTIGATE A USER ACCOUNT IN MICROSOFT DEFENDER FOR ENDPOINTYouTubeHOW TO INVESTIGATE A USER ACCOUNT IN MICROSOFT DEFENDER FOR ENDPOINT
HOW TO INVESTIGATE AN IP ADDRESS IN MICROSOFT DEFENDER FOR ENDPOINTYouTubeHOW TO INVESTIGATE AN IP ADDRESS IN MICROSOFT DEFENDER FOR ENDPOINT
HOW TO INVESTIGATE A DOMAIN IN MICROSOFT DEFENDER FOR ENDPOINTYouTubeHOW TO INVESTIGATE A DOMAIN IN MICROSOFT DEFENDER FOR ENDPOINT