Udemy – Microsoft Sentinel course with hands on sims for beginners

Udemy – Microsoft Sentinel course with hands on sims for beginners
English | Tutorial | Size: 3.82 GB


Learn how to expertly administer Microsoft Sentinel (including SOAR and SIEM) with hands on experience!

We really hope you’ll agree, this training is way more than the average course on Udemy!

Have access to the following:

Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

Introduction

Welcome to the course

Understanding the Microsoft Environment

Foundations of Active Directory Domains

Foundations of RAS, DMZ, and Virtualization

Foundations of the Microsoft Cloud Services

DONT SKIP: The first thing to know about Microsoft cloud services

DONT SKIP: Azure AD is now renamed to Entra ID

Questions for John Christopher

Performing hands on activities

DONT SKIP: Using Assignments in the course

Creating a free Microsoft 365 Account

Getting your free Azure credit

Understanding and setting up a Microsoft Sentinel Workspace

Overview of Microsoft Sentinel

Configuring a Microsoft Sentinel workspace

Managing roles regarding Sentinel

Managing log types, log retention, and data storage in Sentinel

Working with data connectors and ingestion in Microsoft Sentinel

Microsoft Sentinel data source identification

Content hub solutions in Microsoft Sentinel

Kusto Query Language (KQL) will get covered later in the course

Microsoft connectors for Azure, including Azure Policy & diagnostics

Azure Monitor Agent (AMA) and data collection rules

Using Syslog and Common Event Format (CEF) event collections

Working with Windows Security events and Windows Event Forwarding (WEF) collections

How to create custom log tables in the workspace

Ingesting Azure and Entra ID data

Monitoring data ingestion

Using analytics rules in Microsoft Sentinel

Using entities for classification and analysis

Understanding analytics rules in Microsoft Sentinel

Working with analytics rules

Advanced Security Information Model(ASIM) queries with Microsoft Sentinel

Behavioral analytics in Microsoft Sentinel

Dealing with incidents in Microsoft Sentinel

Incident investigation and remediation in Microsoft Sentinel

Concepts of automation rules and Microsoft Sentinel playbooks

Working with automation rules in Microsoft Sentinel

Working with playbooks in Microsoft Sentinel

Concepts of running playbooks against on-premises resources

Understanding hunting with Kusto Query Language (KQL)

Concepts of Kusto Query Language (KQL)

Using Microsoft’s demo environment for learning KQL

Using basic KQL syntax

Filtering based on time ranges with KQL

Displaying columns, amounts and characters with KQL

Working with variables and combining output data with KQL

Looking at threats analytics by using KQL in Defender

Using Microsoft’s Sentinel and Defender repository for hunting queries

Threat hunting with queries and managing workbooks

Using the MITRE ATT&CK matrix

Working with threat indicators

Working with hunts in Microsoft Sentinel

How to monitor hunting queries

Using hunting bookmarks

Restoring archived log data

Working with search jobs

Using workbook templates

Using custom workbooks that include KQL

Adjusting workbook visualizations

Conclusion

Cleaning up your lab environment

Getting a Udemy certificate

BONUS Where do I go from here?

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:

RAPIDGATOR: NITROFLARE:

Leave a Comment