M55610A - Planning and implementing Microsoft Sentinel (SIEM & SOAR) Course Overview

M55610A - Planning and implementing Microsoft Sentinel (SIEM & SOAR) Course Overview

The M55610A - Planning and Implementing Microsoft Sentinel (SIEM & SOAR) course is a comprehensive 3-day program designed for IT professionals and Azure administrators. This course aims to provide in-depth knowledge and practical skills for implementing Microsoft Sentinel, Microsoft’s powerful SIEM and SOAR solution.

Participants will learn about data ingestion methods, User and Entity Behaviour Analytics, and using various management and automation tools. The course covers the critical importance of KQL, methods to connect various services to Microsoft Sentinel, and how to effectively manage incidents.

Key modules include Threat Hunting, utilizing watchlists to prioritize incidents, and integrating threat intelligence into security operations. By the end of the course, you’ll have the expertise to deploy, configure, and use Microsoft Sentinel to enhance your organization's security posture.

Purchase This Course

Fee On Request

  • Live Training (Duration : 24 Hours)
  • Per Participant
  • Guaranteed-to-Run (GTR)
  • Classroom Training fee on request

Filter By:

♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

  • Live Training (Duration : 24 Hours)
  • Per Participant
  • Classroom Training fee on request

♱ Excluding VAT/GST

You can request classroom training in any city on any date by Requesting More Information

Request More Information

Email:  WhatsApp:

Target Audience for M55610A - Planning and implementing Microsoft Sentinel (SIEM & SOAR)

Introduction:
This course, M55610A - Planning and Implementing Microsoft Sentinel (SIEM & SOAR), is designed for IT professionals and Azure administrators seeking to master Microsoft's Sentinel for enhanced security operations.


Job Roles and Audience:


  • Azure Administrators
  • IT Security Managers
  • Security Operations Center (SOC) Analysts
  • Network Administrators
  • Cybersecurity Specialists
  • IT Consultants
  • Security Engineers
  • Systems Integrators
  • Cloud Solution Architects
  • DevOps Engineers
  • IT Auditors
  • Incident Responders
  • Managed Security Services Providers (MSSPs)


Learning Objectives - What you will Learn in this M55610A - Planning and implementing Microsoft Sentinel (SIEM & SOAR)?

Introduction:

The M55610A – Planning and Implementing Microsoft Sentinel (SIEM & SOAR) course equips IT professionals and Azure administrators with the expertise needed to configure, manage, and utilize Microsoft Sentinel for advanced threat detection, response, and overall security information and event management (SIEM) and security orchestration, automation, and response (SOAR).

Learning Objectives and Outcomes:

  • Gain a comprehensive overview of Microsoft Sentinel and its core functionalities.
  • Understand data ingestion methods and effectively utilize data connectors for diverse data sources.
  • Master the basics and advanced features of Kusto Query Language (KQL) for querying and managing data within Microsoft Sentinel.
  • Implement and manage analytics rules to detect and respond to threats.
  • Explore and apply incident management techniques, including the use of automation and playbooks for threat response.
  • Develop threat hunting skills using Microsoft Sentinel, leveraging search jobs and notebooks.
  • Utilize watchlists to prioritize incidents, reduce alert fatigue, and enrich event data.
  • Incorporate Threat Intelligence to enhance detection and response capabilities within Microsoft Sentinel.
  • Understand the role of User and Entity Behavior Analytics (UEBA) in identifying anomalous activities.
  • Manage logs and monitor costs effectively within Microsoft Sentinel.

By the end of this course, participants will be proficient in setting

Suggested Courses

USD