Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training in Saudi Arabia

  • Learn via: Online Instructor-Led / Classroom Based / Onsite
  • Duration: 1 Day
  • Level: Intermediate
  • Price: Please contact for booking options
  • Upcoming Date:
  • UK & Türkiye Based Training Provider

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

We can organize this training at your preferred date and location. Contact Us!

Prerequisites

  • Fundamental understanding of Microsoft security, compliance, and identity products
  • Intermediate understanding of Microsoft Windows
  • Familiarity with Azure services, specifically Azure Virtual Machines
  • Familiarity with Azure virtual machines and virtual networking
  • Basic understanding of scripting concepts

Training Outline

Module 1: Create and manage Microsoft Sentinel workspaces

Learn about the architecture of Microsoft Sentinel workspaces to ensure you configure your system to meet your organization's security operations requirements.

  • Introduction
  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings
  • Configure logs
  • Knowledge check
  • Summary and resources

Module 2: Connect Microsoft services to Microsoft Sentinel

Learn how to connect Microsoft 365 and Azure service logs to Microsoft Sentinel.

  • Introduction
  • Plan for Microsoft services connectors
  • Connect the Microsoft Office 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector
  • Knowledge check
  • Summary and resources

Module 3: Connect Windows hosts to Microsoft Sentinel

One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.

  • Introduction
  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs
  • Knowledge check
  • Summary and resources

Module 4: Threat detection with Microsoft Sentinel analytics

In this module, you learned how Microsoft Sentinel Analytics can help the SecOps team identify and stop cyber attacks.

  • Introduction
  • Exercise - Detect threats with Microsoft Sentinel analytics
  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules
  • Exercise - Detect threats with Microsoft Sentinel analytics
  • Summary

Module 5: Automation in Microsoft Sentinel

By the end of this module, you'll be able to use automation rules in Microsoft Sentinel to automated incident management.

  • Introduction
  • Understand automation options
  • Create automation rules
  • Knowledge check
  • Summary and resources

Module 6: Configure SIEM security operations using Microsoft Sentinel

In this module, you learned how to configure SIEM security operations using Microsoft Sentinel.

  • Introduction
  • Exercise - Configure SIEM operations using Microsoft Sentinel
  • Exercise - Install Microsoft Sentinel Content Hub solutions and data connectors
  • Exercise - Configure a data connector Data Collection Rule
  • Exercise - Perform a simulated attack to validate the Analytic and Automation rules
  • Summary

Why Choose Us

Experience live, interactive learning from the comfort of your home or office with Bilginç IT Academy's Online Instructor-Led Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training in Saudi Arabia. Engage directly with expert trainers in a virtual environment that mirrors the energy and schedule of a physical classroom.

  • Live Sessions: Join scheduled classes with a live instructor and other delegates in real-time.
  • Interactive Experience: Engage in group activities, hands-on labs, and direct Q&A sessions with your trainer and peers.
  • Global Expert Trainers: Learn from a handpicked global pool of expert trainers with deep industry experience.
  • Proven Expertise: Benefit from over 30 years of quality training experience, equipping you with lasting skills for success.
  • Scalable Delivery: Accessible worldwide, including Saudi Arabia, with flexible scheduling to meet your professional needs.

Immerse yourself in our most sought-after learning style for Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training in Saudi Arabia. Our hand-picked classroom venues in Saudi Arabia offer an invaluable human touch, providing a focused and interactive environment for professional growth.

  • Highly Experienced Trainers: Boost your skills with trainers boasting 10-20+ years of real-world experience.
  • State-of-the-Art Venues: Learn in high-standard facilities designed to ensure a comfortable and distraction-free experience.
  • Small Class Sizes: Our limited class sizes foster meaningful discussions and a personalized learning journey.
  • Best Value: Achieve your certification with high-quality training and competitive pricing.

Streamline your organization's training requirements with Bilginç IT Academy’s Onsite Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training in Saudi Arabia. Experience expert-led learning at your own business premises, tailored to your corporate goals.

  • Tailored Learning Experience: Customize the training content to fit your unique business projects or specific technical needs.
  • Maximize Training Budget: Eliminate travel and accommodation costs, focusing your entire budget on the training itself.
  • Team Building Opportunity: Enhance team bonding and collaboration through shared learning experiences in your workspace.
  • Progress Monitoring: Track and evaluate your employees' progression and performance with relative ease and direct oversight.


Contact us for more detail about our trainings and for all other enquiries!

Configure SIEM Security Operations Using Microsoft Sentinel - Applied Skills Workshop Training Course in Saudi Arabia Schedule

Join our public courses in our Saudi Arabia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

We can organize this training at your preferred date and location.
19 Dhuʻl-Qiʻdah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
22 Dhuʻl-Qiʻdah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
03 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
06 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
19 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
28 Dhuʻl-Hijjah 1447 (1 Day)
Riyadh, Jeddah, Dammam, Neom
19 Muharram 1448 (1 Day)
Riyadh, Jeddah, Dammam, Neom
10 Safar 1448 (1 Day)
Riyadh, Jeddah, Dammam, Neom

Saudi Arabia is currently undergoing one of the most significant digital transformations in modern history under the umbrella of Vision 2030. Riyadh, Jeddah, and the revolutionary smart-city project NEOM are at the forefront of this technological leap, focusing on non-oil economic growth through digital innovation. The Kingdom is investing billions into cloud infrastructure, AI research, and cybersecurity to protect its national interests and support a burgeoning private tech sector. Our educational frameworks in Saudi Arabia are aligned with this national transformation, providing the workforce with essential skills to manage mega-scale digital projects. We empower Saudi professionals to take the lead in building a tech-driven future that honors the Kingdom's heritage while embracing the possibilities of the Fourth Industrial Revolution.

By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.