logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Configure SIEM security operations using Microsoft Sentinel (SC-5001)

SS Course: GK834034

Course Overview

TOP

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

                                                                  

Scheduled Classes

TOP
06/02/25 - GVT - Virtual Classroom - Virtual Instructor-Led
08/25/25 - GVT - Virtual Classroom - Virtual Instructor-Led
10/06/25 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP

Module 1: Create and manage Microsoft Sentinel workspaces

  • Describe Microsoft Sentinel workspace architecture
  • Install Microsoft Sentinel workspace
  • Manage a Microsoft Sentinel workspace

Module 2: Connect Microsoft services to Microsoft Sentinel

  • Connect Microsoft service connectors
  • Explain how connectors auto-create incidents in Microsoft Sentinel

Module 3: Connect Windows hosts to Microsoft Sentinel

  • Connect Azure Windows Virtual Machines to Microsoft Sentinel
  • Connect non-Azure Windows hosts to Microsoft Sentinel
  • Configure Log Analytics agent to collect Sysmon events

Module 4: Threat detection with Microsoft Sentinel analytics

  • Explain the importance of Microsoft Sentinel Analytics.
  • Explain different types of analytics rules.
  • Create rules from templates.
  • Create new analytics rules and queries using the analytics rule wizard.
  • Manage rules with modifications.

Module 5: Automation in Microsoft Sentinel

  • Explain automation options in Microsoft Sentinel
  • Create automation rules in Microsoft Sentinel

Module 6: Configure SIEM security operations using Microsoft Sentinel

  • Create and configure a Microsoft Sentinel workspace
  • Deploy Microsoft Sentinel Content Hub solutions and data connectors
  • Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
  • Perform a simulated attack to validate Analytic and Automation rules

    Prerequisites

    TOP
    • Fundamental understanding of Microsoft Azure
    • Basic understanding of Microsoft Sentinel
    • Experience using Kusto Query Language (KQL) in Microsoft Sentinel

      Who Should Attend

      TOP

      Students wishing to configure SIEM security operations using Microsoft Sentinel.