Microsoft Sentinel From Zero To Hero - Job Related Training
Published 1/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.62 GB | Duration: 4h 21m
Published 1/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.62 GB | Duration: 4h 21m
Microsoft Sentinel Tutorial - Step by step configuration. You will learn all the steps required to setup fully product.
What you'll learn
How to become a Security Engineer learning Microsoft Sentinel
How to become a SOC Analyst
What is Microsoft Sentinel
SIEM and SOAR Features in Microsoft Sentinel
What are the Core Components of Microsoft Sentinel
Requirements
Basic Knowledge of Operating Systems, Computer Networks and Security
At least 1 year of experience in the field of IT to make the most of this case
Familiarity with Microsoft Azure Platform
Description
Master Microsoft Sentinel with our comprehensive training program, designed to take you from the fundamentals to an advanced level. Gain the skills to seamlessly set up alerts and efficiently ingest data from diverse sources into Microsoft Sentinel, unlocking the full potential of this powerful security information and event management (SIEM) solution. Elevate your expertise and safeguard your digital landscape with hands-on learning, ensuring you're equipped to navigate the complexities of modern cybersecurityMicrosoft Sentinel, now known as Azure Sentinel, is a cloud-native Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solution offered by Microsoft. It is designed to provide advanced threat detection, investigation, and response capabilities.This course is all about how did I setup Microsoft Sentinel for my various project. We are going to cover.What is a SIEM and How does it workSIEM ArchitectureSentinel ArchitectureWhat is Microsoft Sentinel covering both non-technical and technical overview. Steps required for the deployment.Different use casesHow does log collection works and how to set it upHow to work with Data connectors in SentinelHow to setup alerts in SentinelWhat are different rules templates available to how to make use of rule templatesWorking with Security Analytics in Sentinel
Overview
Section 1: What is a SIEM
Lecture 1 Introduction
Lecture 2 What is a SIEM - An Overview
Lecture 3 Microsoft Sentinel For SOC Analyst
Lecture 4 How Does A SIEM Work
Lecture 5 What is the use of SIEM
Lecture 6 Microsoft Sentinel- A High Level Technical Overview
Section 2: Exploring Microsoft Sentinel
Lecture 7 Microsoft Sentinel Dashboard Overview
Lecture 8 MS Sentinel SIEM Architecture
Lecture 9 Sentinel Architecture - Sentinel Workspace
Section 3: MS Sentinel Overview and 3rd Party Integration
Lecture 10 Importance of SIEM in Cloud Computing - Cloud Security
Lecture 11 Support for 3rd party Integration and Log Ingestion
Section 4: Microsoft Sentinel End to End Solution For Your Security Operations
Lecture 12 Sentinel-For Security Operations
Section 5: Microsoft Sentinel Prerequisites
Lecture 13 MS Sentinel Prerequisites and Planning
Section 6: MS Sentinel Deployment Cases
Lecture 14 Deployment Case 1 - Architecture for M365
Lecture 15 Deployment Case 2 - Architecture for M365 and other Devices
Lecture 16 Exploring More Scenario - Collecting from Networks
Section 7: Understanding Log Collection in Sentinel and Any other SIEM Tool
Lecture 17 What is log collection
Section 8: LAB - How to setup and work with data connectors in MS Sentinel
Lecture 18 LAB-Data Connectors and Log Analytics Workspace
Lecture 19 LAB- Setting up Azure and Office 365 Data Connectors
Section 9: LAB - Microsoft Sentinel Analytics
Lecture 20 What are Security Alerts in Sentinel
Lecture 21 LAB - Understading different type of alerts
Lecture 22 LAB - Creating Alerts in Sentinel
Lecture 23 LAB - Setup Alerts from Content Hub - step by step
Section 10: LAB - Creating Rules from Security Templates
Lecture 24 LAB -Understanding High Severity Alerts. How to setup
Section 11: Sentinel Config Labs - Setting up Data Connectors and Content Hub
Lecture 25 LAB - How to setup Data Connectors and Content Hub
Lecture 26 LAB - Data Connectors and Log Analytics Workspace in Microsoft Sentinel
Lecture 27 LAB - Setting up Azure and Office 365 Data Connectors in Microsoft Sentinel
Section 12: Labs - Creating Security Alerts and Analytics in MS Sentinel
Lecture 28 LAB - Creating Security Alerts in Microsoft Sentinel
Lecture 29 LAB - Creating NRT (Near Real-Time) Alerts for PIM Elevation
Lecture 30 LAB - NRT Alert for Modified Domain Federation for ADFS
Lecture 31 LAB - NRT Alert for Azure DevOps Audit
Lecture 32 LAB - Setting up Alert for Log4J Using Azure WAF
Lecture 33 LAB - Alert for User Agent Search for Log4j
Lecture 34 LAB - Alert for Vulnerable Machines related to Log4j
Lecture 35 LAB - Log4j Vulnerability Exploit aka Log4Shell IP IOC
Section 13: Summary
Lecture 36 Summary
Anyone who wants to become a Security Engineer,Security Architects,Security analyst,Az-500 Aspirants,Security Operations,Cyber Security Professional