Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Microsoft Sentinel: Zero To Hero – Complete Siem Training

    Posted By: ELK1nG
    Microsoft Sentinel: Zero To Hero – Complete Siem Training

    Microsoft Sentinel: Zero To Hero – Complete Siem Training
    Published 5/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 3.96 GB | Duration: 8h 50m

    Hands-on Microsoft Sentinel course covering SIEM setup, data connectors, analytics rules, KQL, and automation & and IR

    What you'll learn

    Understand the fundamentals of Microsoft Sentinel and cloud-native SIEM architecture

    Set up Microsoft Sentinel from scratch using real Azure environments

    Create and fine-tune Analytics Rules (Scheduled, NRT, Fusion, ML-based) for effective threat detection

    Perform threat hunting using KQL with real-world scenarios (e.g., impossible travel)

    Integrate Threat Intelligence feeds and manually add IOCs into Sentinel

    Build and automate incident response using Playbooks and Azure Logic Apps

    Visualize alerts and security metrics using Workbooks in Microsoft Sentinel

    Compare traditional vs. cloud-native SIEMs, including pros, cons, and migration paths

    Gain hands-on experience with labs, real use cases, and SOC workflows

    Requirements

    This course is beginner-friendly and designed to take you from the fundamentals to advanced topics.

    Very Basic understanding of cybersecurity concepts

    A free or trial Microsoft Azure account for practicing in real environments

    Description

    Are you ready to master Microsoft Sentinel, one of the most in-demand cloud-native SIEM platforms used by modern SOCs?This course is your complete zero-to-hero journey, designed for beginners, SOC analysts, cybersecurity engineers, and anyone looking to break into or upskill in cloud security operations.Through real-world labs, step-by-step guidance, and practical examples, you'll go beyond theory and build actual threat detection, automation, and response workflows using Microsoft Sentinel. What You’ll Learn: Set up and configure Microsoft Sentinel from scratch in Azure Ingest data using connectors (Windows logs, threat intel, etc.) Create powerful analytics rules (Scheduled, NRT, Fusion, ML-based) Write and use KQL queries for threat huntingBuild playbooks and automate incident response with Logic Apps Visualize attacks using Workbooks Understand the difference between traditional and cloud-native SIEMs Why This Course Is Different:100% hands-on with real Azure labsNo prior experience required – beginner-friendly explanationsPerfect for job-ready skills in SOC roles Covers full SIEM lifecycle: detect, investigate, respond, visualize Created by a seasoned SOC architect with real-world use casesWhether you're just starting in cybersecurity or looking to strengthen your SIEM expertise, this course will guide you every step of the way.Join today and become job-ready with Microsoft Sentinel!

    Overview

    Section 1: Introduction

    Lecture 2 Our Community

    Section 2: BASICS: Getting Started with Microsoft Sentinel & Cloud-Native SIEM Fundamentals

    Lecture 3 Introduction to Microsoft Sentinel and Its Cloud-Native SIEM Architecture

    Lecture 4 Benefits of Cloud-Native SIEM Architecture: Scalability Explained

    Lecture 5 Flexibility in Cloud-Native SIEM: Adapting to Modern Security Needs

    Lecture 6 Seamless Integration in Sentinel Cloud-Native SIEM: A Key Advantage

    Lecture 7 Cost Efficiency in Cloud-Native SIEM: A Key Advantage

    Lecture 8 Why Cloud Native Matters for Microsoft Sentinel

    Lecture 9 Understanding How Traditional SIEMs Work

    Lecture 10 Challenges and Drawbacks of Traditional SIEM Solutions

    Lecture 11 How Cloud-Native SIEM Works

    Lecture 12 Traditional SIEM vs. Cloud-Native SIEM: Key Differences Explained

    Lecture 13 Azure Sentinel Architecture: Key Components and Workflow

    Section 3: Foundational Labs: Azure Setup for Sentinel

    Lecture 14 Lab: Step-by-Step Guide to Creating a Microsoft Azure Account

    Lecture 15 Lab: Step-by-Step Guide to Creating a Resource Group in Microsoft Azure

    Lecture 16 What is Log Analytics Workspace in Azure?

    Lecture 17 Lab: How to Create a Log Analytics Workspace in Azure

    Lecture 18 Lab: How to Create Microsoft Sentinel in Azure

    Section 4: Data Connectors in Microsoft Sentinel

    Lecture 19 Lab: Introduction to Content Hub in Microsoft Sentinel

    Lecture 20 Lab: Integration of Threat Intelligence into Microsoft Sentinel

    Lecture 21 Lab: Integrating Windows Security Event Logs into Microsoft Sentinel

    Lecture 22 Lab: Verifying Windows Security Event Logs in Microsoft Sentinel

    Section 5: Microsoft Sentinel - Analytics (Threat Detections)

    Lecture 23 Introduction to Microsoft Sentinel Analytics

    Lecture 24 Types of Microsoft Sentinel Analytics (Rules)

    Lecture 25 What is Scheduled Rule in Sentinel

    Lecture 26 Lab: Schedule Rule demo (Brue attack example)

    Lecture 27 Introduction to NRT Rule in Sentinel

    Lecture 28 Lab: NRT Rule Demo

    Lecture 29 Introduction to Fusion rule in Sentinel

    Lecture 30 Lab: Fusion rule demo

    Lecture 31 Introduction to ML Behavior rule

    Lecture 32 Sentinel Incident Investigation

    Section 6: Threat Hunting

    Lecture 33 What is Threat Hunting & Importance of Threat hunting

    Lecture 34 Threat Hunting Scenario: Detecting Impossible Travel Activity

    Lecture 35 Microsoft Entra ID Integration in Sentinel: Unlocking Impossible Travel Detectio

    Lecture 36 Simulating and Hunting Impossible Travel Activity in MS Sentinel Using KQL

    Section 7: Threat Inteligence

    Lecture 37 What is Threat Inteligence

    Lecture 38 real life example of Threat intel

    Lecture 39 Key Components of CTI (1) Direction

    Lecture 40 Key Components of TI-Collection

    Lecture 41 Key Components of TI-Processing

    Lecture 42 Key Componets of TI-analysis

    Lecture 43 Key Components of TI- Dissemination

    Lecture 44 Manually Adding Indicators of Compromise (IOCs) in Microsoft Sentinel

    Lecture 45 Hans-On Lab: Feeding Sentinel with Microsoft Defender Threat Intelligence

    Section 8: Building Automation Workflows: Playbooks & Logic Apps in Sentinel

    Lecture 46 Introduction to Playbooks in Microsoft Sentinel

    Lecture 47 Understanding Logic Apps in Microsoft Sentinel

    Lecture 48 Hands-On: Creating Automation Rules in Microsoft Sentinel

    Lecture 49 Hands-On: Creating Your First Playbook in Microsoft Sentinel

    Lecture 50 Hands-On: Building Playbooks with Azure Logic Apps in Microsoft Sentinel

    Section 9: Workbooks 101: Visualizing Security Data in Sentinel

    Lecture 51 Getting Started with Workbooks in Microsoft Sentinel

    Lecture 52 Breaking Down Workbook Components in Sentinel

    Lecture 53 Hands-On: Creating Your First Workbook in Microsoft Sentinel

    Lecture 54 Hands-On: Create a Workbook for Security Alerts (Last 24 Hours)

    Lecture 55 Hands-On: Visualizing Brute-Force Attack Attempts in Azure Workbooks

    This course is ideal for anyone looking to build hands-on expertise in Microsoft Sentinel and modern, cloud-native SIEM operations,SOC Analysts who want to level up their detection, investigation, and automation skills,Cybersecurity professionals exploring cloud-native SIEM solutions,Azure and Cloud Engineers interested in integrating security monitoring within Azure,IT and Security Operations teams aiming to shift from traditional SIEM to cloud-based tools,Anyone preparing for roles in threat detection, threat hunting, or incident response