Planning and implementing Microsoft Sentinel (SIEM & SOAR)

Planning and implementing Microsoft Sentinel (SIEM & SOAR) Courseware (M55610A)

This 3 day hands on course helps you get ramped up with Microsoft Sentinel and provide hands-on practical experience for product features, capabilities, and scenarios.

During the course you will deploy a Microsoft Sentinel workspace and ingest pre-recorded data to simulate scenarios that showcase various Microsoft Sentinel features. 


This course is aimed at IT professionals and Azure administrators that have some experience administering and configuring Azure, but want to gain an insight into implementing Microsoft’s SIEM/SOAR solution, Microsoft Sentinel.


Module 1: Overview of Microsoft Sentinel


  • Overview of Microsoft Sentinel
  • Data ingestion methods
  • Microsoft Sentinel for MSSPs
  • User and Entity Behaviour Analytics
  • Fusion
  • Notebooks
  • Management & Automation Tools
  • Logs & Costs

Module 2: KQL


  • Importance of KQL across Azure
  • The User Interface (demo)
  • The standard KQL Structure
  • Common KQL Commands

Module 3: Data Connectors


  • Manage content in Microsoft Sentinel
  • Connect data to Microsoft Sentinel using data connectors
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Microsoft 365 Defender to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Connect Common Event Format logs to Microsoft Sentinel
  • Connect syslog data sources to Microsoft Sentinel
  • Connect threat indicators to Microsoft Sentinel

Module 4 – Analytics Rules


  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Threat response with Microsoft Sentinel playbooks

Module 5 – Incident Management


  • Incident management Overview
  • User and Entity Behaviour Analytics
  • Data normalization in Microsoft Sentinel
  • Query, visualize, and monitor data

Module 6 – Hunting


  • Threat hunting concepts
  • Threat hunting with Microsoft Sentinel
  • Use Search jobs in Microsoft Sentinel
  • Hunt for threats using notebooks

Module 7 – Watchlists


  • Prioritize incidents
  • Import business data
  • Reduce Alert Fatigue
  • Enrich Event Data

Module 8 – Threat Intelligence


  • Threat Intelligence Overview
  • Threat Intelligence in Microsoft Sentinel

Required Prerequisites



Length: 3 days | $113.00 per copy
Labs providers: go deploy

LicenseRequest More InformationRequest Trainer Evaluation Copy

*When labs are available, they must be purchased from the lab provider.