Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SC-200: Configure your Microsoft Sentinel environment

Description

Module 1: Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.By the end of this module, you will be able to:Identify the various components and functionality of Microsoft Sentinel.Identify use cases where Microsoft Sentinel would be a good solution.Module 2: Create and manage Microsoft Sentinel workspacesUpon completion of this module, the learner will be able to:Describe Microsoft Sentinel workspace architectureInstall Microsoft Sentinel workspaceManage an Microsoft Sentinel workspaceModule 3: Query logs in Microsoft SentinelUpon completion of this module, the learner will be able to:Use the Logs page to view data tables in Microsoft SentinelQuery the most used tables using Microsoft SentinelModule 4: Use watchlists in Microsoft SentinelUpon completion of this module, the learner will be able to:Create a watchlist in Microsoft SentinelUse KQL to access the watchlist in Microsoft SentinelModule 5: Utilize threat intelligence in Microsoft SentinelUpon completion of this module, the learner will be able to:Manage threat indicators in Microsoft SentinelUse KQL to access threat indicators in Microsoft Sentinel

Tags

Syllabus

Syllabus Module 1: Introduction to Microsoft SentinelIntroductionWhat is Microsoft Sentinel?How Microsoft Sentinel worksWhen to use Microsoft SentinelKnowledge checkSummaryModule 2: Create and manage Microsoft Sentinel workspacesIntroductionPlan for the Azure Sentinel workspaceCreate an Azure Sentinel workspaceManage workspaces across tenants using Azure LighthouseUnderstand Azure Sentinel permissions and rolesManage Azure Sentinel settingsKnowledge checkSummary and resourcesModule 3: Query logs in Microsoft SentinelIntroductionQuery logs in the logs pageUnderstand Azure Sentinel tablesUnderstand common tablesUnderstand Microsoft 365 Defender tablesKnowledge checkSummary and resourcesModule 4: Use watchlists in Microsoft SentinelIntroductionPlan for watchlistsCreate a watchlistKnowledge checkSummary and resourcesModule 5: Utilize threat intelligence in Microsoft SentinelIntroductionDefine threat intelligenceManage your threat indicatorsView your threat indicators with KQLKnowledge checkSummary and resources Read more


SC-200: Configure your Microsoft Sentinel environment

Affiliate notice

Module 1: Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.By the end of this module, you will be able to:Identify the various components and functionality of Microsoft Sentinel.Identify use cases where Microsoft Sentinel would be a good solution.Module 2: Create and manage Microsoft Sentinel workspacesUpon completion of this module, the learner will be able to:Describe Microsoft Sentinel workspace architectureInstall Microsoft Sentinel workspaceManage an Microsoft Sentinel workspaceModule 3: Query logs in Microsoft SentinelUpon completion of this module, the learner will be able to:Use the Logs page to view data tables in Microsoft SentinelQuery the most used tables using Microsoft SentinelModule 4: Use watchlists in Microsoft SentinelUpon completion of this module, the learner will be able to:Create a watchlist in Microsoft SentinelUse KQL to access the watchlist in Microsoft SentinelModule 5: Utilize threat intelligence in Microsoft SentinelUpon completion of this module, the learner will be able to:Manage threat indicators in Microsoft SentinelUse KQL to access threat indicators in Microsoft Sentinel

Syllabus Module 1: Introduction to Microsoft SentinelIntroductionWhat is Microsoft Sentinel?How Microsoft Sentinel worksWhen to use Microsoft SentinelKnowledge checkSummaryModule 2: Create and manage Microsoft Sentinel workspacesIntroductionPlan for the Azure Sentinel workspaceCreate an Azure Sentinel workspaceManage workspaces across tenants using Azure LighthouseUnderstand Azure Sentinel permissions and rolesManage Azure Sentinel settingsKnowledge checkSummary and resourcesModule 3: Query logs in Microsoft SentinelIntroductionQuery logs in the logs pageUnderstand Azure Sentinel tablesUnderstand common tablesUnderstand Microsoft 365 Defender tablesKnowledge checkSummary and resourcesModule 4: Use watchlists in Microsoft SentinelIntroductionPlan for watchlistsCreate a watchlistKnowledge checkSummary and resourcesModule 5: Utilize threat intelligence in Microsoft SentinelIntroductionDefine threat intelligenceManage your threat indicatorsView your threat indicators with KQLKnowledge checkSummary and resources Read more