SC-5001 Configure SIEM Security Operations Using Microsoft Sentinel

Course Overview

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses. After completing this course, students will be able to: 

  • Create and configure a Microsoft Sentinel workspace 
  • Deploy a Microsoft Sentinel content hub solution 
  • Connect Windows hosts to Microsoft Sentinel 
  • Configure analytics rules in Microsoft Sentinel 
  • Configure automation in Microsoft Sentinel



Training Type

Full Time


Who Should Attend

The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advise on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft Defender XDR, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies.


Course Duration

1 Day


Total Training Duration (Hour)

7 Hours


Course Outline

Module 1: Create and manage Microsoft Sentinel workspaces

Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements.

 

 

Module 2: Connect Microsoft services to Microsoft Sentinel

Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel.

 

 

Module 3: Connect Windows hosts to Microsoft Sentinel

Two of the most common logs to collect are Windows security events and Sysmon. Learn how Microsoft Sentinel makes this easy with the Microsoft Windows Events data connectors.

 

 

Module 4: Threat detection with Microsoft Sentinel analytics

In this module, you learned how Microsoft Sentinel Analytics can help the SecOps team identify and stop cyber attacks.



Module 5: Automation in Microsoft Sentinel

By the end of this module, you're able to use automation rules in Microsoft Sentinel to automated incident management.

 

 

Module 6: Configure SIEM security operations using Microsoft Sentinel

In this module, you learned how to configure SIEM security operations using Microsoft Sentinel.


Pre-requisites
  • Fundamental understanding of Microsoft Azure
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel



Price
Course Fee Payable
Original Fee Before GST With GST (9%)
Course Fee $699.00 $761.91

Please note that prices are subjected to change.
Back to Catalogue →
Next Available Schedules
Available Seats:
Course Name:
Category:
Delivered By:
Trainer:
Venue:
Language:
Session Dates:

Registration Date:
From To