Configure SIEM Security Operations Using Microsoft Sentinel (SC-5001)
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.
Course Information
Price: $695.00
Duration: 1 day
Certification:
Exam:
Learning Credits:
Continuing Education Credits:
Check out our full list of training locations and learning formats. Please note that the location you choose may be an Established HD-ILT location with a virtual live instructor.
Train face-to-face with the live instructor.
Access to on-demand training content anytime, anywhere.
Attend the live class from the comfort of your home or office.
Interact with a live, remote instructor from a specialized, HD-equipped classroom near you. An SLI sales rep will confirm location availability prior to registration confirmation.
All Sunset Learning dates are guaranteed to run!
Register
- Please Contact Us to request a class date or speak with someone about scheduling options.
Prerequisites:
- Fundamental understanding of Microsoft Azure
- Basic understanding of Microsoft Sentinel
- Experience using Kusto Query Language (KQL) in Microsoft Sentinel
Target Audience:
- Students wishing to configure SIEM security operations using Microsoft Sentinel.
Course Objectives:
- Create and manage Microsoft Sentinel workspaces
- Connect Microsoft services to Microsoft Sentinel
- Connect Windows hosts to Microsoft Sentinel
- Threat detection with Microsoft Sentinel analytics
- Automation in Microsoft Sentinel
- Configure SIEM security operations using Microsoft Sentinel
Course Outline:
Module 1: Create and manage Microsoft Sentinel workspaces
- Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements.
Module 2: Connect Microsoft services to Microsoft Sentinel
- Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel.
Module 3: Connect Windows hosts to Microsoft Sentinel
- One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.
Module 4: Threat detection with Microsoft Sentinel analytics
- In this module, you learned how Microsoft Sentinel Analytics can help the SecOps team identify and stop cyber attacks.
Module 5: Automation in Microsoft Sentinel
- By the end of this module, you'll be able to use automation rules in Microsoft Sentinel to automated incident management.
Module 6: Configure SIEM security operations using Microsoft Sentinel
- In this module, you learned how to configure SIEM security operations using Microsoft Sentinel.