SC-5001 Configure SIEM security operations using Microsoft Sentinel

Skip to Scheduled Dates

Course Overview

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

Course Outline

1 - Create and manage Microsoft Sentinel workspaces

  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings
  • Configure logs

2 - Connect Microsoft services to Microsoft Sentinel

  • Plan for Microsoft services connectors
  • Connect the Microsoft Office 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector

3 - Connect Windows hosts to Microsoft Sentinel

  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs

4 - Threat detection with Microsoft Sentinel analytics

  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules

5 - Automation in Microsoft Sentinel

  • Understand automation options
  • Create automation rules

6 - Configure SIEM security operations using Microsoft Sentinel

< Back to Course Search

Class Dates & Times

Class times are listed Eastern time

This is a 1-day class

Price: $695.00

NCLGISA Price: $347.50

Register for Class

Register When Time Where How
Register 12/09/2024 9:00AM - 5:00PM Online VILT
Register 01/02/2025 9:00AM - 5:00PM Online VILT
Register 04/04/2025 9:00AM - 5:00PM Online VILT