Career Transformation
Workshop Every Month
Countries and Counting
Schedule | Course Fee (Incl. of all Taxes) | Register Your Interest |
---|---|---|
July 07th - 10th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
10% Off
$448
$403
Fast Filling! Hurry Up.
|
|
July 14th - 17th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
10% Off
$448
$403
|
|
July 21st - 30th
06:00 PM - 10:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
10% Off
$448
$403
|
|
July 28th - 31st
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
Guaranteed-to-Run
|
10% Off
$448
$403
|
|
August 04th - 07th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
20% Off
$448
$358
|
|
August 11th - 14th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
20% Off
$448
$358
|
|
August 18th - 27th
06:00 PM - 10:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
20% Off
$448
$358
|
|
August 25th - 28th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
Guaranteed-to-Run
|
20% Off
$448
$358
|
|
September 01st - 04th
09:00 AM - 05:00 PM (CST)
Live Virtual Classroom (Duration : 32 Hours)
|
25% Off
$448
$336
|
It is recommended that participants have:
Having prior experience in IT administration or security operations will be helpful for understanding the course content more effectively.
Manage a Security Operations Environment (20–25%)
Configure Defender XDR settings, alerts, automation, and attack disruption
Manage devices, permissions, exposure, and vulnerabilities
Plan and configure Microsoft Sentinel: roles, storage, data ingestion
Integrate data sources (Syslog, CEF, WEF, Azure resources)
Monitor and optimize data ingestion
Configure Protections and Detections (15–20%)
Set policies in Defender for Endpoint, Cloud Apps, Office 365, Cloud
Create/manage custom detections, alert tuning, deception in XDR
Configure analytics rules, behavioral analytics, and ASIM in Sentinel
Manage Incident Response (25–30%)
Investigate/remediate threats across Defender XDR and Microsoft 365
Use audit logs, Graph logs, content search
Respond to incidents in Sentinel with playbooks and automation
Use Microsoft Security Copilot for threat analysis and response
Manage Security Threats (15–20%)
Threat hunting in XDR and Sentinel using KQL and MITRE ATT&CK
Manage threat indicators, bookmarks, archived logs
Create custom hunting queries and workbooks in Sentinel
Learning Path 1: Mitigate threats using Microsoft Defender XDR
Modules:
Introduction to Microsoft 365 threat protection
Mitigate incidents using Microsoft Defender XDR
Protect your identities with Entra ID Protection
Remediate risks with Microsoft Defender for Office 365
Safeguard your environment with Microsoft Defender for Identity
Secure your cloud apps and services with Microsoft Defender for Cloud Apps
Learning Path 2: Get started with Microsoft Copilot for Security
Modules:
Fundamentals of Generative AI
Describe Microsoft Copilot for Security
Describe core features of Microsoft Copilot for Security
Describe the Microsoft Copilot for Security embedded experience
Learning Path 3: Mitigate threats using Microsoft Purview
Modules:
Microsoft Purview Compliance Solutions
Respond to data loss prevention alerts using Microsoft Purview
Manage insider risk in Microsoft Purview
Investigate threats using Content search in Microsoft Purview
Investigate threats using Microsoft Purview Audit
Learning Path 4: Mitigate threats using Microsoft Defender for Endpoint
Modules:
Protect against threats with Microsoft Defender for Endpoint
Deploy the Microsoft Defender for Endpoint environment
Implement Windows security enhancements with Microsoft Defender for Endpoint
Perform device investigations in Microsoft Defender for Endpoint
Perform actions on a device using Microsoft Defender for Endpoint
Perform evidence and entities investigations using Microsoft Defender for Endpoint
Configure and manage automation using Microsoft Defender for Endpoint
Configure for alerts and detections in Microsoft Defender for Endpoint
Utilize Vulnerability Management in Microsoft Defender for Endpoint
Learning Path 5: Mitigate threats using Microsoft Defender for Cloud
Modules:
Plan for cloud workload protections using Microsoft Defender for Cloud
Connect Azure assets to Microsoft Defender for Cloud
Connect non-Azure resources to Microsoft Defender for Cloud
Manage your cloud security posture management
Explain cloud workload protections in Microsoft Defender for Cloud
Remediate security alerts using Microsoft Defender for Cloud
Learning Path 6: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Modules:
Construct KQL statements for Microsoft Sentinel
Analyze query results using KQL
Build multi-table statements using KQL
Work with data in Microsoft Sentinel using Kusto Query Language
Learning Path 7: Configure your Microsoft Sentinel environment
Modules:
Introduction to Microsoft Sentinel
Create and manage Microsoft Sentinel workspaces
Query logs in Microsoft Sentinel
Use watchlists in Microsoft Sentinel
Utilize threat intelligence in Microsoft Sentinel
Integrate Microsoft Defender XDR with Microsoft Sentinel
Learning Path 8: Connect logs to Microsoft Sentinel
Modules:
Connect data to Microsoft Sentinel using data connectors
Connect Microsoft services to Microsoft Sentinel
Connect Microsoft Defender XDR to Microsoft Sentinel
Connect Windows hosts to Microsoft Sentinel
Connect Common Event Format logs to Microsoft Sentinel
Connect syslog data sources to Microsoft Sentinel
Connect threat indicators to Microsoft Sentinel
Learning Path 9: Create detections and perform investigations using Microsoft Sentinel
Modules:
Threat detection with Microsoft Sentinel analytics
Automation in Microsoft Sentinel
Threat response with Microsoft Sentinel playbooks
Security incident management in Microsoft Sentinel
Identify threats with Entity behavioral analytics in Microsoft Sentinel
Data normalization in Microsoft Sentinel
Query, visualize, and monitor data in Microsoft Sentinel
Manage content in Microsoft Sentinel
Learning Path 10: Perform threat hunting in Microsoft Sentinel
Modules:
Explain threat hunting concepts in Microsoft Sentinel
Threat hunting with Microsoft Sentinel
Use Search jobs in Microsoft Sentinel
Hunt for threats using notebooks in Microsoft Sentinel
The training, courseware, and lab experience were insightful and valuable. Keep up the great work and learning experience!
Nitish A. Anand – Accenture
Course: SC-200: Microsoft Security Operations Analyst
Date: 15th Jan 2025
The instructor was professional and very content.
Justine Daudi Mlimbilah – Bank of Africa, Tanzania
Course: MD-102: Microsoft 365 Endpoint Administrator
Date: 20th Dec 2024
The instructor was so knowledgeable & humble. Rare to find someone so confident but so down to earth these days. So appreciative to him.”
Mohd. Hassan – Ministry of Finance, UAE
Course: AZ-700: Designing and Implementing Microsoft Azure Networking Solutions
Date: 31st July 2024
Instructor is experienced and knowledgeable in guiding.
Dharshini Mahalaxmi – Dr. MGR Education and Research Institute, Chennai, India
Course: SC-300: Microsoft Identity and Access Administrator
Date: 4th May 2024