Implementing and Administering Azure Sentinel

Go to class
Write Review

Free Online Course: Implementing and Administering Azure Sentinel provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Implementing and Administering Azure Sentinel is taught by Pete Zerger.

Overview
  • Learn how to implement and administer Azure Sentinel, a cloud-native security event and information management (SEIM) system that detects threats while automating threat responses.

    Azure Sentinel is a next-generation, cloud-native security event and information management (SEIM) system that provides real-time analysis of security alerts generated for your cloud and on-premises resources. By leveraging built-in machine learning from the security analytics experts at Microsoft, Sentinel effectively detects threats while automating threat response using orchestration and built-in or custom security playbooks. In this course, join Pete Zerger as he guides you through the implementation and configuration of Azure Sentinel. Discover how to connect key services and threat intelligence resources to Sentinel; investigate cases; create security playbooks to set automated threat responses to issues; and leverage search and query tools to hunt for threats.

Syllabus
  • Introduction

    • An introduction to Azure Sentinel
    • What you should know
    • Lab requirements
    1. Introducing Azure Sentinel
    • Sentinel feature flyover
    • Onboarding Azure Sentinel
    • Kusto query language quickstart
    2. Connecting Data Sources
    • Connecting Microsoft services
    • Connecting external services
    • Connecting threat intelligence
    3. Threat Detection, Investigation, and Response
    • Detecting suspicious activities
    • Investigating cases
    • Responding to threats
    • Setting up automated threat response
    4. Advanced Threat Hunting Scenarios
    • Threat hunting basics
    • Hunting with bookmarks
    • Hunting with notebooks
    • Building custom dashboards
    Conclusion
    • Next steps