Companies Home Search Profile

Microsoft Sentinel course with hands on sims for beginners

Focused View

John Christopher

6:24:03

12 View
  • 1 - Welcome to the course.mp4
    04:45
  • 2 - Understanding the Microsoft Environment.mp4
    01:51
  • 3 - Foundations of Active Directory Domains.mp4
    12:11
  • 4 - Foundations of RAS DMZ and Virtualization.mp4
    13:09
  • 5 - Foundations of the Microsoft Cloud Services.mp4
    17:14
  • 6 - DONT SKIP The first thing to know about Microsoft cloud services.mp4
    02:10
  • 7 - DONT SKIP Azure AD is now renamed to Entra ID.mp4
    03:29
  • 8 - Questions for John Christopher.mp4
    05:42
  • 9 - DONT SKIP Using Assignments Simulations in the course.mp4
    04:11
  • 10 - Creating a free Microsoft 365 Account.mp4
    05:38
  • 11 - Getting your free Azure credit.mp4
    03:32
  • 12 - Microsoft-Sentinel.pdf
  • 12 - Overview of Microsoft Sentinel.mp4
    08:44
  • 13 - Configuring a Microsoft Sentinel workspace.mp4
    04:36
  • 14 - Managing roles regarding Sentinel.mp4
    05:29
  • 15 - Managing log types log retention and data storage in Sentinel.mp4
    03:53
  • 16 - Microsoft Sentinel data source identification.mp4
    04:59
  • 16 - identify-data-sources-to-be-ingested-for-microsoft-sentinel.zip
  • 17 - Setting up connectors for ingesting data into Microsoft Sentinel.mp4
    09:08
  • 18 - Connecting Sentinel with Microsoft 365 Defender and Defender for Cloud.mp4
    02:50
  • 19 - Common Event Format CEF and Syslog event collections.mp4
    07:14
  • 20 - Windows Security Event Collection setup in Microsoft Sentinel.mp4
    08:04
  • 21 - Managing threat intelligence connectors in Microsoft Sentinel.mp4
    06:36
  • 22 - Working with custom log tables.mp4
    07:25
  • 22 - sample.zip
  • 23 - Sentinel-Analytics-Rules.pdf
  • 23 - Understanding analytics rules in Microsoft Sentinel.mp4
    05:30
  • 24 - Fusion rule configuration.mp4
    03:29
  • 25 - Security analytics rules.mp4
    04:58
  • 26 - Working with scheduled query rules in Microsoft Sentinel.mp4
    03:25
  • 27 - Custom scheduled query rules.mp4
    06:24
  • 27 - KQL-custom-scheduled-query.txt
  • 28 - KQL-NRT-rule.txt
  • 28 - Working with nearrealtime NRT analytics rules.mp4
    03:52
  • 29 - Content hub analytics rules.mp4
    03:21
  • 30 - Watchlists in Microsoft Sentinel.mp4
    04:57
  • 30 - watchlist-sample.csv
  • 31 - Threat indicators in Microsoft Sentinel.mp4
    02:30
  • 32 - Working with using entities for classifying and analyzing data.mp4
    11:28
  • 33 - Advanced Security Information ModelASIM queries with Microsoft Sentinel.mp4
    13:06
  • 33 - Advanced-Security-Information-Model-ASIM.pdf
  • 34 - ASIM parser management.mp4
    11:03
  • 34 - ASIM-example.txt
  • 35 - Using automation rules.mp4
    12:10
  • 36 - Using playbooks in Microsoft Sentinel.mp4
    18:19
  • 37 - Automation rule triggering using analytic rules.mp4
    04:07
  • 38 - Alert and incident playbook triggering.mp4
    01:06
  • 39 - Incident generation in Microsoft Sentinel.mp4
    08:11
  • 40 - Understanding the concepts of triaging incidents in Sentinel.mp4
    06:09
  • 41 - Microsoft Sentinel incident investigation.mp4
    09:39
  • 42 - How to respond to Microsoft Sentinel incidents.mp4
    05:50
  • 43 - Multiworkspace incident investigation.mp4
    02:13
  • 44 - Workbook template customization and management.mp4
    07:30
  • 45 - Implementing custom workbooks in Microsoft Sentinel.mp4
    01:56
  • 46 - Working with advanced visualizations.mp4
    07:14
  • 47 - MITRE ATTCK attack vectors in Microsoft Sentinel.mp4
    12:58
  • 48 - Using hunting queries from the content gallery.mp4
    07:57
  • 49 - Hunting query customization.mp4
    09:25
  • 50 - Data investigations with hunting bookmarks.mp4
    06:53
  • 51 - Using Livestream to monitor hunting queries.mp4
    03:40
  • 52 - How archived log data can be retrieved in Microsoft Sentinel.mp4
    03:50
  • 53 - Search job management in Microsoft Sentinel.mp4
    04:44
  • 54 - Entity Behavior Analytics settings.mp4
    11:26
  • 55 - Entity page investigation of threats.mp4
    04:49
  • 56 - Anomaly detection analytics rules in Microsoft Sentinel.mp4
    09:27
  • 56 - KQL-Anomaly-Rule.txt
  • 57 - Cleaning up your lab environment.mp4
    02:04
  • 58 - Getting a Udemy certificate.mp4
    01:31
  • 59 - BONUS Where do I go from here.mp4
    04:02
  • Description


    Learn how to expertly administer Microsoft Sentinel (including SOAR and SIEM) with hands on experience!

    What You'll Learn?


    • Learn the concepts and perform hands on activities needed to master Microsoft Sentinel (SOAR and SIEM)
    • Gain a tremendous amount of knowledge involving Microsoft Sentinel (SOAR and SIEM)
    • Learn using hands on simulations on how to manage Microsoft Sentinel (SOAR and SIEM)
    • Learn how to set up your own test lab for practicing the concepts!

    Who is this for?


  • IT people interested in learning a tremendous amount about Microsoft Sentinel (SOAR and SIEM)
  • What You Need to Know?


  • Willingness to put in the time and practice the steps shown in the course
  • More details


    Description

    We really hope you'll agree, this training is way more than the average course on Udemy!

    Have access to the following:

    • Training from an instructor of over 20 years who has trained thousands of people and also a Microsoft Certified Trainer

    • Lecture that explains the concepts in an easy to learn method for someone that is just starting out with this material

    • Instructor led hands on and simulations to practice that can be followed even if you have little to no experience

    TOPICS COVERED INCLUDING HANDS ON LECTURE AND PRACTICE TUTORIALS:

    Introduction

    • Welcome to the course

    • Understanding the Microsoft Environment

    • Foundations of Active Directory Domains

    • Foundations of RAS, DMZ, and Virtualization

    • Foundations of the Microsoft Cloud Services

    • DONT SKIP: The first thing to know about Microsoft cloud services

    • DONT SKIP: Azure AD is now renamed to Entra ID

    • Questions for John Christopher

    Performing hands on activities

    • DONT SKIP: Using Assignments in the course

    • Creating a free Microsoft 365 Account

    • Getting your free Azure credit

    Understanding and setting up a Microsoft Sentinel Workspace

    • Overview of Microsoft Sentinel

    • Configuring a Microsoft Sentinel workspace

    • Managing roles regarding Sentinel

    • Managing log types, log retention, and data storage in Sentinel

    Working with data connectors and ingestion in Microsoft Sentinel

    • Microsoft Sentinel data source identification

    • Setting up connectors for ingesting data into Microsoft Sentinel

    • Connecting Sentinel with Microsoft 365 Defender and Defender for Cloud

    • Common Event Format (CEF) and Syslog event collections

    • Windows Security Event Collection setup in Microsoft Sentinel

    • Managing threat intelligence connectors in Microsoft Sentinel

    • Working with custom log tables

    Using analytics rules in Microsoft Sentinel

    • Understanding analytics rules in Microsoft Sentinel

    • Fusion rule configuration

    • Security analytics rules

    • Working with scheduled query rules in Microsoft Sentinel

    • Custom scheduled query rules

    • Working with near-real-time (NRT) analytics rules

    • Content hub analytics rules

    • Watchlists in Microsoft Sentinel

    • Threat indicators in Microsoft Sentinel

    Classification, normalization & security orchestration automated response (SOAR)

    • Working with using entities for classifying and analyzing data

    • Advanced Security Information Model(ASIM) queries with Microsoft Sentinel

    • ASIM parser management

    • Using automation rules

    • Using playbooks in Microsoft Sentinel

    • Automation rule triggering using analytic rules

    • Alert and incident playbook triggering

    Dealing with Incidents and Workbooks for analyzes and interpretation of data

    • Incident generation in Microsoft Sentinel

    • Understanding the concepts of triaging incidents in Sentinel

    • Microsoft Sentinel incident investigation

    • How to respond to Microsoft Sentinel incidents

    • Multi-workspace incident investigation

    • Workbook template customization and management

    • Implementing custom workbooks in Microsoft Sentinel

    • Working with advanced visualizations

    Threat hunting and entity behavior analytics in Microsoft Sentinel

    • MITRE ATT&CK attack vectors in Microsoft Sentinel

    • Using hunting queries from the content gallery

    • Hunting query customization

    • Data investigations with hunting bookmarks

    • Using Livestream to monitor hunting queries

    • How archived log data can be retrieved in Microsoft Sentinel

    • Search job management in Microsoft Sentinel

    • Entity Behavior Analytics settings

    • Entity page investigation of threats

    • Anomaly detection analytics rules in Microsoft Sentinel

    Conclusion

    • Cleaning up your lab environment

    • Getting a Udemy certificate

    • BONUS Where do I go from here?

    Who this course is for:

    • IT people interested in learning a tremendous amount about Microsoft Sentinel (SOAR and SIEM)

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    John Christopher
    John Christopher
    Instructor's Courses
    John Christopher is a Technical Instructor that has been in the business for over 20 years. His first experience with information technology occurred in the early 90s when he ran an MS-DOS based BBS(Bulletin Board System) as a System Operator. In the late 90s, after working with Windows NT 3.50 performing backups for Regal Group, he decided to get Windows NT Microsoft Certified.In 1998 he got his first Microsoft Certified Systems Engineer and Microsoft Certified Trainer certification. Shortly after getting certified, he began working as a Junior Administrator and Instructor for Knowledge Alliance in Atlanta GA. From there John was able to become one of the first people in the world to gain an MCSE for the Windows 2000 operating system and he began teaching full time for a company called Productivity Point International. At Productivity Point, John got Citrix Metaframe certified and began teaching Citrix along with Microsoft classes. Productivity Point began experiencing financial troubles and John moved on to work with another training company, located in Atlanta GA. in 2001.For many years at the training company in Atlanta John was the network administrator and held the title of Senior Technical Instructor for the company. John designed and administered their network from the ground up, going from a single floor in a single building, to multiple floors in multiple buildings and locations. He furthered his certifications, gaining the MCSE for 2003, 2008(MCITP), 2012, A+, Network+, Security+, Exchange, and CCNA. Along with his Network admin duties, John taught hundreds of students during his 11 years for the company. During all his years of training, John has had the honor of doing lots of classes with the military, along with quite a few classes within on-site military bases. In 2012, he decided to break away from company he had been working for and do consulting and contract teaching. Currently, John gets hired by many different training companies to teach technical training classes all over the United States. He is also hired as a consultant to go into companies and work on their networks and implement, along with troubleshoot real world scenarios.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 59
    • duration 6:24:03
    • Release Date 2024/01/12