Engaging visual content to enhance understanding and learning experience.
Insightful audio sessions featuring expert discussions and real-world cases.
Listen and learn anytime with convenient audio-based knowledge sharing.
Comprehensive digital guides offering in-depth knowledge and learning support.
Interactive assessments to reinforce learning and test conceptual clarity.
Supplementary references and list of tools to deepen knowledge and practical application.
Azure Portal
Microsoft Sentinel
Kusto Query Language (KQL)
Azure Logic Apps
Azure Monitor
Configure workspaces for centralized security monitoring.
Integrate Microsoft services and Windows machines for data collection.
Use analytics and Logic Apps for automated incident response.
Enable SIEM tools for real-time threat detection and governance.
Module 1: Create and manage Microsoft Sentinel workspaces
Module 1: Create and manage Microsoft Sentinel workspaces
Module 3: Connect Windows hosts to Microsoft Sentinel
Module 4: Threat detection with Microsoft Sentinel analytics
Module 5: Automation in Microsoft Sentinel
Module 6: Configure SIEM security operations using Microsoft Sentinel
It’s a cloud-native SIEM and SOAR solution for threat detection, investigation, and response.
Yes, an active Azure subscription is required for hands-on labs and exercises.
It’s best for users with basic Azure and Sentinel knowledge.
It detects threats from Microsoft 365, Azure services, Windows hosts, and custom sources.
Yes, using Logic Apps, you can automate incident management and response workflows.