Microsoft Sentinel: Zero To Hero – Complete Siem Training

Posted By: ELK1nG

Microsoft Sentinel: Zero To Hero – Complete Siem Training
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.96 GB | Duration: 8h 50m

Hands-on Microsoft Sentinel course covering SIEM setup, data connectors, analytics rules, KQL, and automation & and IR

What you'll learn

Understand the fundamentals of Microsoft Sentinel and cloud-native SIEM architecture

Set up Microsoft Sentinel from scratch using real Azure environments

Create and fine-tune Analytics Rules (Scheduled, NRT, Fusion, ML-based) for effective threat detection

Perform threat hunting using KQL with real-world scenarios (e.g., impossible travel)

Integrate Threat Intelligence feeds and manually add IOCs into Sentinel

Build and automate incident response using Playbooks and Azure Logic Apps

Visualize alerts and security metrics using Workbooks in Microsoft Sentinel

Compare traditional vs. cloud-native SIEMs, including pros, cons, and migration paths

Gain hands-on experience with labs, real use cases, and SOC workflows

Requirements

This course is beginner-friendly and designed to take you from the fundamentals to advanced topics.

Very Basic understanding of cybersecurity concepts

A free or trial Microsoft Azure account for practicing in real environments

Description

Are you ready to master Microsoft Sentinel, one of the most in-demand cloud-native SIEM platforms used by modern SOCs?This course is your complete zero-to-hero journey, designed for beginners, SOC analysts, cybersecurity engineers, and anyone looking to break into or upskill in cloud security operations.Through real-world labs, step-by-step guidance, and practical examples, you'll go beyond theory and build actual threat detection, automation, and response workflows using Microsoft Sentinel. What You’ll Learn: Set up and configure Microsoft Sentinel from scratch in Azure Ingest data using connectors (Windows logs, threat intel, etc.) Create powerful analytics rules (Scheduled, NRT, Fusion, ML-based) Write and use KQL queries for threat huntingBuild playbooks and automate incident response with Logic Apps Visualize attacks using Workbooks Understand the difference between traditional and cloud-native SIEMs Why This Course Is Different:100% hands-on with real Azure labsNo prior experience required – beginner-friendly explanationsPerfect for job-ready skills in SOC roles Covers full SIEM lifecycle: detect, investigate, respond, visualize Created by a seasoned SOC architect with real-world use casesWhether you're just starting in cybersecurity or looking to strengthen your SIEM expertise, this course will guide you every step of the way.Join today and become job-ready with Microsoft Sentinel!

Overview

Section 1: Introduction

Lecture 2 Our Community

Section 2: BASICS: Getting Started with Microsoft Sentinel & Cloud-Native SIEM Fundamentals

Lecture 3 Introduction to Microsoft Sentinel and Its Cloud-Native SIEM Architecture

Lecture 4 Benefits of Cloud-Native SIEM Architecture: Scalability Explained

Lecture 5 Flexibility in Cloud-Native SIEM: Adapting to Modern Security Needs

Lecture 6 Seamless Integration in Sentinel Cloud-Native SIEM: A Key Advantage

Lecture 7 Cost Efficiency in Cloud-Native SIEM: A Key Advantage

Lecture 8 Why Cloud Native Matters for Microsoft Sentinel

Lecture 9 Understanding How Traditional SIEMs Work

Lecture 10 Challenges and Drawbacks of Traditional SIEM Solutions

Lecture 11 How Cloud-Native SIEM Works

Lecture 12 Traditional SIEM vs. Cloud-Native SIEM: Key Differences Explained

Lecture 13 Azure Sentinel Architecture: Key Components and Workflow

Section 3: Foundational Labs: Azure Setup for Sentinel

Lecture 14 Lab: Step-by-Step Guide to Creating a Microsoft Azure Account

Lecture 15 Lab: Step-by-Step Guide to Creating a Resource Group in Microsoft Azure

Lecture 16 What is Log Analytics Workspace in Azure?

Lecture 17 Lab: How to Create a Log Analytics Workspace in Azure

Lecture 18 Lab: How to Create Microsoft Sentinel in Azure

Section 4: Data Connectors in Microsoft Sentinel

Lecture 19 Lab: Introduction to Content Hub in Microsoft Sentinel

Lecture 20 Lab: Integration of Threat Intelligence into Microsoft Sentinel

Lecture 21 Lab: Integrating Windows Security Event Logs into Microsoft Sentinel

Lecture 22 Lab: Verifying Windows Security Event Logs in Microsoft Sentinel

Section 5: Microsoft Sentinel - Analytics (Threat Detections)

Lecture 23 Introduction to Microsoft Sentinel Analytics

Lecture 24 Types of Microsoft Sentinel Analytics (Rules)

Lecture 25 What is Scheduled Rule in Sentinel

Lecture 26 Lab: Schedule Rule demo (Brue attack example)

Lecture 27 Introduction to NRT Rule in Sentinel

Lecture 28 Lab: NRT Rule Demo

Lecture 29 Introduction to Fusion rule in Sentinel

Lecture 30 Lab: Fusion rule demo

Lecture 31 Introduction to ML Behavior rule

Lecture 32 Sentinel Incident Investigation

Section 6: Threat Hunting

Lecture 33 What is Threat Hunting & Importance of Threat hunting

Lecture 34 Threat Hunting Scenario: Detecting Impossible Travel Activity

Lecture 35 Microsoft Entra ID Integration in Sentinel: Unlocking Impossible Travel Detectio

Lecture 36 Simulating and Hunting Impossible Travel Activity in MS Sentinel Using KQL

Section 7: Threat Inteligence

Lecture 37 What is Threat Inteligence

Lecture 38 real life example of Threat intel

Lecture 39 Key Components of CTI (1) Direction

Lecture 40 Key Components of TI-Collection

Lecture 41 Key Components of TI-Processing

Lecture 42 Key Componets of TI-analysis

Lecture 43 Key Components of TI- Dissemination

Lecture 44 Manually Adding Indicators of Compromise (IOCs) in Microsoft Sentinel

Lecture 45 Hans-On Lab: Feeding Sentinel with Microsoft Defender Threat Intelligence

Section 8: Building Automation Workflows: Playbooks & Logic Apps in Sentinel

Lecture 46 Introduction to Playbooks in Microsoft Sentinel

Lecture 47 Understanding Logic Apps in Microsoft Sentinel

Lecture 48 Hands-On: Creating Automation Rules in Microsoft Sentinel

Lecture 49 Hands-On: Creating Your First Playbook in Microsoft Sentinel

Lecture 50 Hands-On: Building Playbooks with Azure Logic Apps in Microsoft Sentinel

Section 9: Workbooks 101: Visualizing Security Data in Sentinel

Lecture 51 Getting Started with Workbooks in Microsoft Sentinel

Lecture 52 Breaking Down Workbook Components in Sentinel

Lecture 53 Hands-On: Creating Your First Workbook in Microsoft Sentinel

Lecture 54 Hands-On: Create a Workbook for Security Alerts (Last 24 Hours)

Lecture 55 Hands-On: Visualizing Brute-Force Attack Attempts in Azure Workbooks

This course is ideal for anyone looking to build hands-on expertise in Microsoft Sentinel and modern, cloud-native SIEM operations,SOC Analysts who want to level up their detection, investigation, and automation skills,Cybersecurity professionals exploring cloud-native SIEM solutions,Azure and Cloud Engineers interested in integrating security monitoring within Azure,IT and Security Operations teams aiming to shift from traditional SIEM to cloud-based tools,Anyone preparing for roles in threat detection, threat hunting, or incident response