Image

Configure SIEM security operations using Microsoft Sentinel SC-5001

Configure SIEM security operations using Microsoft Sentinel SC-5001 Certification
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

Configure SIEM security operations using Microsoft Sentinel SC-5001 Objectives

  • Create and manage Microsoft Sentinel workspaces
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Configure SIEM security operations using Microsoft Sentinel

Need Assistance Finding the Right Training Solution

Our Consultants are here to assist you

Key Point of Training Programs

  • Configure SIEM security operations using Microsoft Sentinel SC-5001 Outline

    Create and manage Microsoft Sentinel workspaces

    Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organisation's security operations requirements.

    - Plan for the Microsoft Sentinel workspace
    - Create a Microsoft Sentinel workspace
    - Manage workspaces across tenants using Azure Lighthouse
    - Understand Microsoft Sentinel permissions and roles
    - Manage Microsoft Sentinel settings
    - Configure logs
    - Knowledge check
    - Summary and resources

    Connect Microsoft services to Microsoft Sentinel

    Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel.

    - Plan for Microsoft services connectors
    - Connect the Microsoft Office 365 connector
    - Connect the Microsoft Entra connector
    - Connect the Microsoft Entra ID Protection connector
    - Connect the Azure Activity connector
    - Knowledge check
    - Summary and resources

    Connect Windows hosts to Microsoft Sentinel

    One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.

    - Plan for Windows hosts security events connector
    - Connect using the Windows Security Events via AMA Connector
    - Connect using the Security Events via Legacy Agent Connector
    - Collect Sysmon event logs
    - Knowledge check
    - Summary and resources

    Threat detection with Microsoft Sentinel analytics

    Learn how Microsoft Sentinel Analytics can help the SecOps team identify and stop cyber attacks.

    - Exercise Detect threats with Microsoft Sentinel analytics
    - What is Microsoft Sentinel Analytics?
    - Types of analytics rules
    - Create an analytics rule from templates
    - Create an analytics rule from wizard
    - Manage analytics rules
    - Exercise Detect threats with Microsoft Sentinel analytics
    - Summary

    Automation in Microsoft Sentinel

    Use automation rules in Microsoft Sentinel to automate incident management.

    - Understand automation options
    - Create automation rules
    - Knowledge check
    - Summary and resources

    Configure SIEM security operations using Microsoft Sentinel

    Learn how to configure SIEM security operations using Microsoft Sentinel.

    - Exercise Configure SIEM operations using Microsoft Sentinel
    - Exercise Install Microsoft Sentinel Content Hub solutions and data connectors
    - Exercise Configure a data connector Data Collection Rule
    - Exercise Perform a simulated attack to validate the Analytic and Automation rules
    - Summary

  • Configure SIEM security operations using Microsoft Sentinel SC-5001 Format

    In-Person

    Online

  • Configure SIEM security operations using Microsoft Sentinel SC-5001 Prerequisites

    Fundamental understanding of Microsoft Azure
    Basic understanding of Microsoft Sentinel
    Experience using Kusto Query Language (KQL) in Microsoft Sentinel

    Have a Question About This Course?