- Lectures: 13
- Students: 1
Mastering Microsoft Sentinel – SIEM & SOAR for Next-Gen SOC
This course structure offers a comprehensive learning journey from the basics of SOC and SIEM to advanced skills in Microsoft Sentinel. It’s suitable for beginners as well as professionals looking to master Microsoft Sentinel in a real-world context.
Chapter 1: Understanding the Security Operations Center (SOC)
• Overview of Traditional vs. Next-Gen SOC
• Roles and Responsibilities in a SOC
• Importance of a SOC in Modern Enterprises
Chapter 2: Introduction to SIEM (Security Information and Event Management)
• What is SIEM?
• How SIEM Works
• Benefits of Using SIEM in a SOC
Chapter 3: Introduction to SOAR (Security Orchestration, Automation, and Response)
• What is SOAR?
• Difference between SIEM and SOAR
• How SOAR Enhances Incident Response
Chapter 4: Introduction to Microsoft Sentinel
• What is Microsoft Sentinel
• Key Features and Benefits
Chapter 5: Setting Up Microsoft Sentinel
• Prerequisites and Licensing
• Connecting to Azure Log Analytics Workspace
• Deployment and Initial Setup
Chapter 6: Data Sources and Connectors
• Types of Data Sources (Cloud, On-Premises, Custom)
• Configuring Data Connectors in Microsoft Sentinel
• Best Practices for Data Ingestion
Chapter 7: Azure Firewall connector for Sentinel
• Deploying & Configuring Azure Firewall
• Connecting Azure Firewall to Sentinel
Chapter 8 – Configuring syslog server
• What is a Syslog Server
• Setting Up a Syslog Server
Chapter 9: Kusto Query Language (KQL)
• Kusto Query Language Basics
• Getting data
Chapter 10 – Analytics rules
• Analytics rules
• Types of analytics rules
Chapter 11: Simulating a Brute Force Attack & Investigating with Sentinel
• Simulating a Brute Force Attack
• Investigating with Sentinel
Chapter 12: Automation Rule
• Automation in Microsoft Sentinel
• Playbooks in Microsoft Sentinel
Chapter 13: Chapter 13 – Playbook
• Example of a Playbook
-
Chapter 1: Understanding the Security Operations Center
-
Chapter 2: Introduction to SIEM
-
Lecture 2.1Introduction to SIEM (Security Information and Event Management)
-
-
Chapter 3: Introduction to SOAR
-
Lecture 3.1Introduction to SOAR (Security Orchestration, Automation, and Response)
-
-
Chapter 4: Introduction to Microsoft Sentinel
-
Lecture 4.1Introduction to Microsoft Sentinel
-
-
Chapter 5: Setting Up Microsoft Sentinel
-
Lecture 5.1Setting Up Microsoft Sentinel
-
-
Chapter 6: Data Sources and Connectors
-
Lecture 6.1Data Sources and Connectors
-
-
Chapter 7: Azure Firewall connector for Sentinel
-
Lecture 7.1Azure Firewall connector for Sentinel
-
-
Chapter 8: Configuring syslog server
-
Lecture 8.1Configuring syslog server
-
-
Chapter 9: Kusto Query Language (KQL)
-
Lecture 9.1Kusto Query Language (KQL)
-
-
Chapter 10: Analytics rules
-
Lecture 10.1Analytics rules
-
-
Chapter 11: Simulating a Brute Force Attack
-
Lecture 11.1Simulating a Brute Force Attack & Investigating with Sentinel
-
-
Chapter 12: Automation Rule
-
Lecture 12.1Automation Rule
-
-
Chapter 13: PlayBooks
-
Lecture 13.1PlayBooks
-