Threat Protection and Incident Response with Microsoft Sentinel

Last Updated Sep 2025

Course Overview

Microsoft Sentinel is your bird's-eye view across the enterprise alleviating the stress of increasingly sophisticated attacks, increasing volumes of alerts, and long resolution time frames. In this training you will learn how to deploy and connect this SIEM and SOAR solution to different data sources. You will learn how to use intelligent security analytics and threat intelligence capabilities for attack detection, threat visibility, proactive hunting, and threat response

Duration - 12 Hours

Level - Advanced

Style - Self paced

Target Audience - Project Ready with Labs

Certification - No

Hands on Labs - Yes

Solution Areas - Security, Protect cloud, AI Platform and Apps

ESI Course Code - DW-340

Course Modules

Threat Intelligence and Investigation in Microsoft Sentinel​

In this module, Learn to Design your Microsoft Sentinel workspace architecture​, Manage roles and permissions​, Enable data connectors using a content hub​, Deploy a log forwarder to ingest Syslog and CEF logs to Microsoft Sentinel​, Understand security coverage by the MITRE ATT&CK® framework​, Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data​ and AWS S3 connector – architecture overview​.

Identify advanced threats in Microsoft Sentinel

In this module, you will learn about Introduction to Microsoft content hub solutions​, Introduction to Threat Intelligence in Microsoft Sentinel​, connect your threat intelligence platform to Microsoft Sentinel​, Work with threat indicators, Detect Threat and Analyse Data​, investigating incidents​ and Using Workbooks to investigate threats.

Automating responses and integration with Microsoft Sentinel

In this module, you will learn about Introduction to User and Entity Behavior Analytics (UEBA)​, UEBA analytics architecture​, Enable UEBA​, Anomalies detected by UEBA​, Querying UEBA​, Investigating with UEBA.

Integration with Microsoft Sentinel

In this module, you will learn about Introduction to SOAR in Microsoft Sentinel​, Creating and working with Automation Rules​, Automation with Playbooks​, Azure Logic Apps​, Customizing Microsoft Sentinel playbooks from templates​, Bring Your own Machine Learning platform​, Integration with Microsoft 365 Defender and Integration with Microsoft Defender for Cloud

Security Copilot and Unified SOC

Microsoft Security Copilot enhances threat detection and response by integrating AI-driven insights directly into the SOC workflow. It extends security operations capabilities through seamless integration with the Microsoft Defender suite, improving efficiency and decision-making.

Post-training Skills Assessment

Take this assessment to validate your skills gathered from the self-paced online learning course completed in this course to mark your completion.

Course Completion Survey

Share your feedback with us regarding your experience!

Other courses in this Category

Intermediate

Implement Microsoft Defender for Endpoint

Duration - 12 Hours
Course
Intermediate

Protect cloud, AI Platform and Apps by implementing Defender for Cloud

Duration - 12 Hours
Course
Advanced

Threat Protection and Incident Response with Microsoft Sentinel

Duration - 12 Hours
Course
Beginner

Sales - Modernizing your SecOps with Microsoft Sentinel

Duration - 1.5 Hours
Course