Course Catalog
Configure SIEM security operations using Microsoft Sentinel (SC-5001)
Code: SC-5001
Duration: 1 Day
$675 USD

OVERVIEW

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

DELIVERY FORMAT

This course is available in the following formats:

Virtual Classroom

Duration: 1 Day
Classroom

Duration: 1 Day

CLASS SCHEDULE

Delivery Format: Virtual Classroom
Date: Oct 16 2026 - Oct 16 2026 | 09:00 - 17:00 EDT
Location: Online
Course Length: 1 Day

$ 675

GOALS

Students will learn to,

  • Create and manage Microsoft Sentinel workspaces
  • Connect Microsoft services to Microsoft Sentinel
  • Connect Windows hosts to Microsoft Sentinel
  • Threat detection with Microsoft Sentinel analytics
  • Automation in Microsoft Sentinel
  • Configure SIEM security operations using Microsoft Sentinel
OUTLINE

Module 1: Create and manage Microsoft Sentinel workspaces

  • Describe Microsoft Sentinel workspace architecture
  • Install Microsoft Sentinel workspace
  • Manage a Microsoft Sentinel workspace

Module 2: Connect Microsoft services to Microsoft Sentinel

  • Connect Microsoft service connectors
  • Explain how connectors auto-create incidents in Microsoft Sentinel

Module 3: Connect Windows hosts to Microsoft Sentinel

  • Connect Azure Windows Virtual Machines to Microsoft Sentinel
  • Connect non-Azure Windows hosts to Microsoft Sentinel
  • Configure Log Analytics agent to collect Sysmon events

Module 4: Threat detection with Microsoft Sentinel analytics

  • Explain the importance of Microsoft Sentinel Analytics.
  • Explain different types of analytics rules.
  • Create rules from templates.
  • Create new analytics rules and queries using the analytics rule wizard.
  • Manage rules with modifications.

Module 5: Automation in Microsoft Sentinel

  • Explain automation options in Microsoft Sentinel
  • Create automation rules in Microsoft Sentinel

Module 6: Configure SIEM security operations using Microsoft Sentinel

  • Create and configure a Microsoft Sentinel workspace
  • Deploy Microsoft Sentinel Content Hub solutions and data connectors
  • Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
  • Perform a simulated attack to validate Analytic and Automation rules

Module 1: Create and manage Microsoft Sentinel workspaces

  • Describe Microsoft Sentinel workspace architecture
  • Install Microsoft Sentinel workspace
  • Manage a Microsoft Sentinel workspace

Module 2: Connect Microsoft services to Microsoft Sentinel

  • Connect Microsoft service connectors
  • Explain how connectors auto-create incidents in Microsoft Sentinel

Module 3: Connect Windows hosts to Microsoft Sentinel

  • Connect Azure Windows Virtual Machines to Microsoft Sentinel
  • Connect non-Azure Windows hosts to Microsoft Sentinel
  • Configure Log Analytics agent to collect Sysmon events

Module 4: Threat detection with Microsoft Sentinel analytics

  • Explain the importance of Microsoft Sentinel Analytics.
  • Explain different types of analytics rules.
  • Create rules from templates.
  • Create new analytics rules and queries using the analytics rule wizard.
  • Manage rules with modifications.

Module 5: Automation in Microsoft Sentinel

  • Explain automation options in Microsoft Sentinel
  • Create automation rules in Microsoft Sentinel

Module 6: Configure SIEM security operations using Microsoft Sentinel

  • Create and configure a Microsoft Sentinel workspace
  • Deploy Microsoft Sentinel Content Hub solutions and data connectors
  • Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
  • Perform a simulated attack to validate Analytic and Automation rules
LABS

Will Be Updated Soon!
Will Be Updated Soon!
WHO SHOULD ATTEND

Students wishing to configure SIEM security operations using Microsoft Sentinel.

PREREQUISITES

  • Fundamental understanding of Microsoft Azure
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel