________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Planning and implementing Microsoft Sentinel (SIEM & SOAR) course - M55610A
This hands-on course helps you become familiar with Microsoft Sentinel and gives you hands-on experience with product features, capabilities, and scenarios.
During the course, you will deploy a Microsoft Sentinel workspace and ingest pre-recorded data to simulate scenarios demonstrating various Microsoft Sentinel features.
Microsoft Sentinel - SIEM and SOAR with Azure - Microsoft Sentinel Deployment - Microsoft SIEM SOAR - Azure Cloud Security - Microsoft Sentinel Advanced Course
Addressed to
This course is intended for IT professionals and Azure administrators who have some experience managing and configuring Azure, but want to gain knowledge about implementing Microsoft's SIEM/SOAR solution, Microsoft Sentinel.
Training objectives
The purpose of this course is to train participants to:
- Plan and implement Microsoft Sentinel as a SIEM and SOAR solution.
- Configure Log Analytics workspaces and connect relevant data sources.
- Implement analysis rules for threat detection.
- Automate incident responses using playbooks and automation logic.
- Integrate Sentinel with other Microsoft security solutions, such as Defender for Cloud and Azure Key Vault.
- Conduct threat research and apply threat hunting techniques.
- Optimize security monitoring in hybrid and multicloud environments.
Course Content: Planning and Implementing Microsoft Sentinel (SIEM & SOAR)
Module 1: Microsoft Sentinel Overview
Lessons:
- Microsoft Sentinel Overview
- Data ingestion methods
- Microsoft Sentinel for MSSP
- Analysis of user and entity behavior
- Fusion
- Notebooks
- Management and automation tools
- Records and costs
Module 2: KQL
Lessons:
- Importance of KQL in Azure
- The user interface (demo)
- The standard KQL structure
- Common KQL Commands
Module 3: Data Connectors
Lessons:
- Manage content in Microsoft Sentinel
- Connect data to Microsoft Sentinel using data connectors
- Connect Microsoft services to Microsoft Sentinel
- Connect Microsoft 365 Defender to Microsoft Sentinel
- Connect Windows hosts to Microsoft Sentinel
- Connect Common Event Format logs to Microsoft Sentinel
- Connect syslog data sources to Microsoft Sentinel
- Connect threat indicators to Microsoft Sentinel
Module 4 – Analysis Rules
Lessons:
- Threat detection with Microsoft Sentinel analysis
- Automation in Microsoft Sentinel
- Responding to threats with Microsoft Sentinel manuals
Module 5 – Incident Management
Lessons:
- Incident Management Overview
- Analysis of user and entity behavior
- Data normalization in Microsoft Sentinel
- Query, visualize, and monitor data
Module 6 – Hunting
Lessons:
- Threat Hunting Concepts
- Threat Hunting with Microsoft Sentinel
- Use the job search feature in Microsoft Sentinel
- Threat hunting using notebooks
Module 7 – Watchlists
Lessons:
- Prioritize incidents
- Import business data
- Reduce alert fatigue
- Enrich event data
Module 8 – Threat Intelligence
Lessons:
- Threat Intelligence Overview
- Threat Intelligence in Microsoft Sentinel
Prerequisites
To get the most out of this course, it is recommended:
Basic knowledge of:
- Microsoft Azure and its portal.
- Cloud security and SIEM/SOAR concepts.
- Azure management, including role-based access control (RBAC).
Familiarity with:
- Azure Monitor, Log Analytics and Azure Security Center.
- Automation and incident response concepts.
Language
-
Course: English
-
Labs: English