Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Microsoft Sentinel course with hands on sims for beginners

via Udemy

Overview

Learn how to expertly administer Microsoft Sentinel (including SOAR and SIEM) with hands on experience!

What you'll learn:
  • Learn the concepts and perform hands on activities needed to master Microsoft Sentinel (SOAR and SIEM)
  • Gain a tremendous amount of knowledge involving Microsoft Sentinel (SOAR and SIEM)
  • Learn using hands on simulations on how to manage Microsoft Sentinel (SOAR and SIEM)
  • Learn how to set up your own test lab for practicing the concepts!

We really hope you'll agree, this training is way more than the average course on Udemy!

Have access to the following:

  • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

  • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

  • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVEREDINCLUDINGHANDSONLECTUREANDPRACTICETUTORIALS:

Introduction

  • Welcome to the course

  • Understanding the Microsoft Environment

  • Foundations of Active Directory Domains

  • Foundations of RAS, DMZ, and Virtualization

  • Foundations of the Microsoft Cloud Services

  • DONT SKIP: The first thing to know about Microsoft cloud services

  • DONT SKIP: Azure AD is now renamed to Entra ID

  • Questions for John Christopher

Performing hands on activities

  • DONT SKIP: Using Assignments in the course

  • Creating a free Microsoft 365 Account

  • Getting your free Azure credit

Understanding and setting up a Microsoft Sentinel Workspace

  • Overview of Microsoft Sentinel

  • Configuring a Microsoft Sentinel workspace

  • Managing roles regarding Sentinel

  • Managing log types, log retention, and data storage in Sentinel

Working with data connectors and ingestion in Microsoft Sentinel

  • Microsoft Sentinel data source identification

  • Content hub solutions in Microsoft Sentinel

  • Kusto Query Language (KQL) will get covered later in the course

  • Microsoft connectors for Azure, including Azure Policy & diagnostics

  • Azure Monitor Agent (AMA) and data collection rules

  • Using Syslog and Common Event Format (CEF) event collections

  • Working with Windows Security events and Windows Event Forwarding (WEF) collections

  • How to create custom log tables in the workspace

  • Ingesting Azure and Entra ID data

  • Monitoring data ingestion

Using analytics rules in Microsoft Sentinel

  • Using entities for classification and analysis

  • Understanding analytics rules in Microsoft Sentinel

  • Working with analytics rules

  • Advanced Security Information Model(ASIM) queries with Microsoft Sentinel

  • Behavioral analytics in Microsoft Sentinel

Dealing with incidents in Microsoft Sentinel

  • Incident investigation and remediation in Microsoft Sentinel

  • Concepts of automation rules and Microsoft Sentinel playbooks

  • Working with automation rules in Microsoft Sentinel

  • Working with playbooks in Microsoft Sentinel

  • Concepts of running playbooks against on-premises resources

Understanding hunting with Kusto Query Language (KQL)

  • Concepts of Kusto Query Language (KQL)

  • Using Microsoft's demo environment for learning KQL

  • Using basic KQL syntax

  • Filtering based on time ranges with KQL

  • Displaying columns, amounts and characters with KQL

  • Working with variables and combining output data with KQL

  • Looking at threats analytics by using KQL in Defender

  • Using Microsoft's Sentinel and Defender repository for hunting queries

Threat hunting with queries and managing workbooks

  • Using the MITRE ATT&CK matrix

  • Working with threat indicators

  • Working with hunts in Microsoft Sentinel

  • How to monitor hunting queries

  • Using hunting bookmarks

  • Restoring archived log data

  • Working with search jobs

  • Using workbook templates

  • Using custom workbooks that include KQL

  • Adjusting workbook visualizations

Conclusion

  • Cleaning up your lab environment

  • Getting a Udemy certificate

  • BONUS Where do I go from here?

Syllabus

  • Introduction
  • Performing hands on activities
  • Understanding and setting up a Microsoft Sentinel Workspace
  • Working with data connectors and ingestion in Microsoft Sentinel
  • Using analytics rules in Microsoft Sentinel
  • Classification, normalization & security orchestration automated response (SOAR)
  • Dealing with Incidents and Workbooks for analyzes and interpretation of data
  • Threat hunting and entity behavior analytics in Microsoft Sentinel
  • Role Plays (Optional - Not needed to complete course and get certificate)
  • Conclusion

Taught by

John Christopher | 490,000+ enrollments

Reviews

4.8 rating at Udemy based on 726 ratings

Start your review of Microsoft Sentinel course with hands on sims for beginners

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.