Arrow Electronics, Inc.

Implementing Microsoft Sentinel

CODE: MCS_WS-RDSCAZSENT

LENGTH: 8 Hours (1 day)

PRICE: Request Price

Description

This one-day course will cover how to secure and protect your assets with Microsoft Sentinel and discover how Microsoft brings hybrid security with the SIEM in Azure-based.

Objectives

Description of Content

1. Overview of Azure Core security features

2. Microsoft Sentinel & Defender product line integrations
- M365 security and Sentinel

3. Collecting data from several sources
- Creating connection with data source
- Monitoring results

4. Chasing security issues
- Hunting with KQL
- View MITRE results and other alerts

Audience

This one-day course is aimed at administrators and IT professionals who want to deepen their know-how to carry out an implementation of SIEM in cloud-based and Azure Security concerns.

Prerequisites

Before attending this course, students must have:
- Good understanding of Microsoft Infrastructure elements
- Good knowledge of AAD and AD
- Good understanding of networking and security
- Understanding of TCP/IP v4

Demos are based on current version of products and could be in some cases, with interactive guides for attendees.

Programme

Module 1: “Overview of Azure Core security features”

This module discusses how to protect standard elements, such as VM, Containers, Storage on Azure & hybrid approach.

After completing this module, students will be able to:
- Understand what the Azure Core components
- Understand the basic security embedded on each Core components

 

Module 2: “Microsoft Sentinel & Defender product line integrations”

This module discusses the connection between Microsoft Sentinel and the Defender Product Line.

After completing this module, students will be able to:
- Create a link between Defender for Endpoint and Sentinel
- Supervise the results in Sentinel Console

 

Module 3: “Collecting data from several sources”

This module discusses the way to manage other data sources with Sentinel and how to work with it into the solution.

After completing this module, students will be able to:
- Establish connections for 3rd party products
- Implement monitoring on data

 

Module 4: “Chasing security issues”

This module discusseshow to prepare Microsoft Defender for Cloud and protect all elements (network and others), inside the resource groups.

After completing this module, students will be able to:
- Understand the usage of KQL for hunting
- Use MITRE and other resources to analyze security threats

Follow on courses

Microsoft Certified Security Operations Analyst SC-200

Session Dates