This is an example of a simple banner

Training: Configure SIEM security operations using Microsoft Sentinel (SC-5001)

Ref. SC-5001
Duration:
1
 day
Exam:
Not certifying
Level:
Intermediate

Configure SIEM security operations using Microsoft Sentinel (SC-5001)

Master the Configuration of Microsoft Sentinel to Secure Your Systems

Cybersecurity is a major concern for all businesses. With the rise in cyberattacks, having an efficient system to monitor, detect, and respond to threats is essential. The SC-5001 training, “Configuring SIEM Security Operations with Microsoft Sentinel,” equips you with the skills needed to implement advanced monitoring using Microsoft Sentinel.

Through this cybersecurity training, you will learn how to configure your workspace in Azure, connect various Microsoft services, and leverage Azure Log Analytics to analyze event logs. You will also discover how to enhance threat detection with analytical rules and automate certain tasks using Azure Logic Apps. The goal is clear: strengthen your security posture and effectively protect your IT infrastructure.

Participant Profiles

  • Cybersecurity analysts
  • System and network administrators
  • IT security engineers
  • Information security consultants
  • Chief Information Security Officers (CISOs)

Objectives

  • Configure and manage a Microsoft Sentinel workspace
  • Connect Microsoft services and integrate event logs
  • Utilize Azure Log Analytics to monitor and analyze data
  • Implement analytical rules to detect threats
  • Automate incident management with Azure Logic Apps
  • Optimize the protection and monitoring of IT infrastructures

Prerequisites

  • Understand the basics of Microsoft Azure
  • Have a basic knowledge of Microsoft Sentinel
  • Master the Kusto Query Language (KQL) in Microsoft Sentinel

Course Content

Module 1: Create and manage Microsoft Sentinel workspaces

  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings
  • Configure logs

Module 2: Connect Microsoft services to Microsoft Sentinel

  • Plan for Microsoft services connectors
  • Connect the Microsoft 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector

Module 3: Connect Windows hosts to Microsoft Sentinel

  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs

Module 4: Threat detection with Microsoft Sentinel analytics

  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules

Module 5: Automation in Microsoft Sentinel

  • Understand automation options
  • Create automation rules

Module 6: Configure SIEM security operations using Microsoft Sentinel

  • Install Microsoft Sentinel Content Hub solutions and data connectors
  • Configure a data connector Data Collection Rule
  • Perform a simulated attack to validate the Analytic and Automation rules

Documentation

  • Access to Microsoft Learn, Microsoft’s online learning platform, offering interactive resources and educational content to deepen your knowledge and develop your technical skills.

Lab / Exercises

  • This course provides you with exclusive access to the official Microsoft lab, enabling you to practice your skills in a professional environment.

Complementary Courses

Eligible Funding

ITTA is a partner of a continuing education fund dedicated to temporary workers. This fund can subsidize your training, provided that you are subject to the “Service Provision” collective labor agreement (CCT) and meet certain conditions, including having worked at least 88 hours in the past 12 months.

Additional Information

Why learn to configure Microsoft Sentinel (SC-5001) for cybersecurity?

With the increasing number of cyber threats, companies must enhance their ability to detect and respond to cyberattacks. Microsoft Sentinel is a SIEM (Security Information and Event Management) solution that centralizes, analyzes, and automates threat management. This training will teach you how to leverage Microsoft Sentinel to improve your infrastructure security.

The fundamentals of Microsoft Sentinel

Microsoft Sentinel integrates natively with Azure and simplifies security event monitoring. You will learn how to create and manage a Sentinel workspace tailored to your organization’s needs. You will also discover how to configure permissions, optimize log management, and ensure real-time data supervision.

Connecting and analyzing event logs

Proper data management is essential for identifying suspicious behavior. With Microsoft Sentinel’s native connectors, you can integrate logs from various services, such as Microsoft 365 or Azure Log Analytics. This training guides you through adding and managing these data sources to optimize threat collection and analysis.

Advanced threat detection with analytics

Setting up analytical rules is crucial for detecting malicious activity. You will learn how to configure different types of rules and use the Kusto Query Language (KQL) to create advanced analyses. Microsoft Sentinel enables rapid incident identification and alerts security teams efficiently.

Automating incident response

Responsiveness is a key factor in cybersecurity. With Azure Logic Apps, you can automate actions in response to detected threats. This training will show you how to create automation rules to effectively respond to incidents, reduce response times, and improve infrastructure security.

Validating configurations and simulated attack testing

To ensure the effectiveness of your detection and automation rules, it is essential to test your configuration. You will learn how to use simulated attack scenarios to validate your settings and continuously improve your defense strategies.

FAQ

What are the prerequisites for this training?

It is recommended to have basic knowledge of Microsoft Azure and Microsoft Sentinel, as well as familiarity with the Kusto Query Language (KQL).

Is this training suitable for beginners?

This course is primarily intended for professionals who already have some knowledge of cybersecurity and security event management.

What are the benefits of Microsoft Sentinel?

Microsoft Sentinel enables proactive monitoring, advanced threat detection, and effective automation of incident responses.

Which professionals can benefit from this training?

Cybersecurity analysts, system administrators, security engineers, and information security consultants will gain valuable skills from this course.

Prix de l'inscription
CHF 850.-
Inclus dans ce cours
  • Training provided by a certified trainer
  • 180 days of access to Official Microsoft Labs
  • Official documentation in digital format
  • Official Microsoft achievement badge
Mois actuel

ven25Avr09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven25Avr09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5001

ven30Mai09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven30Mai09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5001

ven04juil09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven04juil09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5001

ven08Aoû09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven08Aoû09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5001

ven12Sep09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven12Sep09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5001

ven17Oct09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven17Oct09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5001

ven21Nov09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven21Nov09:00ven17:00Lausanne, Avenue Mon repos 24, 1005 Lausanne Etiquettes de sessionSC-5001

ven26Déc09:00ven17:00VirtuelVirtual Etiquettes de sessionSC-5001

ven26Déc09:00ven17:00Genève, Route des Jeunes 35, 1227 Carouge Etiquettes de sessionSC-5001

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday
8:30 AM to 6:00 PM
Tel. 058 307 73 00

Contact-us

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Make a request

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday, from 8:30 am to 06:00 pm.

Contact us

Your request