
{"id":20108,"date":"2024-03-07T11:44:17","date_gmt":"2024-03-07T11:44:17","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=20108"},"modified":"2025-06-26T08:55:06","modified_gmt":"2025-06-26T08:55:06","slug":"configure-siem-security-operations-using-microsoft-sentinel","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/microsoft-security\/sc-5001-configure-siem-security-operations-using-microsoft-sentinel","title":{"rendered":"SC-5001: Configure SIEM security operations using Microsoft Sentinel"},"content":{"rendered":"<p>Microsoft Sentinel is a powerful Security Information and Event Management (SIEM) solution that enables organizations to detect, investigate, and respond to threats. In this course, CloudThat will offer you the key features of Sentinel, you will gain practical skills for threat detection and incident response. Whether you&#8217;re an IT professional, security ana alyst, or cloud administrator, this training will equip you with the knowledge needed to protect your organization&#8217;s assets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Sentinel is a powerful Security Information and Event Management (SIEM) solution that enables organizations to detect, investigate, and respond to threats. In this course, CloudThat will offer you the key features of Sentinel, you will gain practical skills for threat detection and incident response. Whether you&#8217;re an IT professional, security ana alyst, or cloud [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":13797,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[64],"metadata":{"stm_lms_product_id":["20109"],"_edit_lock":["1750930359:1508"],"_edit_last":["1508"],"permalink_customizer":["microsoft-security\/sc-5001-configure-siem-security-operations-using-microsoft-sentinel"],"permalink_customizer_regenerate_status":["1"],"_wp_page_template":["default"],"price":["14900"],"wpdocs-meta-bdt":["14900"],"wpdocs-meta-gbp":["349"],"wpdocs-meta-usd":["499"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_yoast_wpseo_wordproof_timestamp":[""],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["Learn how to enhance security operations with Microsoft Sentinel. "],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["SC-5001 Course Overview:"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After Completing the course Configure SIEM security operations using Microsoft Sentinel, students will be able to:"],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Create and configure a Microsoft Sentinel workspace \r\n\r\n"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Deploy a Microsoft Sentinel content hub solution \r\n\r\n"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Configure analytics rules in Microsoft Sentinel \r\n\r\n"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Configure automation in Microsoft Sentinel "],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["4"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["Key Features of Configure SIEM security operations using Microsoft Sentinel course:"],"_key_features_heading":["field_645388ceffdd1"],"key_features":["6"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who can participate in the SC-5001 training? "],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend":["1"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":["What are the prerequisites for the training?"],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":["<li>Basic understanding of cloud computing and security concepts.  <\/li>\r\n<li>Familiarity with Azure services. <\/li>"],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Why Choose CloudThat as Your Training Partner? "],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list":["5"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification details:"],"_certification_heading":["field_64538bffffdd5"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":["21738"],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Modules covered in the training program:"],"_course_outline_heading":["field_64538a8effdd4"],"course_section":["6"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":["2"],"_popular_sort":["field_6172496402af3"],"related_courses":["a:3:{i:0;s:4:\"8142\";i:1;s:4:\"8141\";i:2;s:5:\"10409\";}"],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":["2497"],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":["5"],"_average_review_count":["field_62b00367d2de6"],"faq_heading":[""],"_faq_heading":["field_64538c59ffdd8"],"curriculum":[""],"featured":[""],"views":["2679"],"level":["intermediate"],"current_students":["0"],"duration_info":["1 Day"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":[""],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["64"],"_thumbnail_id":["13797"],"key_features_0_lists":["Real-time threat detection."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["Customizable dashboards."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["Automated incident response."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["Integration with Azure Security Center."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["Machine learning-based analytics."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["Threat intelligence integration."],"_key_features_5_lists":["field_6103ad559f5b3"],"who_should_attend_0_attend_lists":["IT professionals, security analysts, cloud administrators, and anyone interested in enhancing security operations using Microsoft Sentinel. "],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"course_features_0_features_list_0_list":["Experienced instructors with real-world expertise.  "],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["Hands-on labs for practical learning. "],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["Flexible training schedules.  "],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["Comprehensive course materials."],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["Post-training support."],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_1_heading":["Learning Objectives of the Course SC-5001:"],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["Understand the role of SIEM in modern security operations."],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list_1_list":["Gain proficiency in configuring and managing Microsoft Sentinel."],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Develop skills for effective threat detection and incident response."],"_course_features_1_features_list_2_list":["field_644a0fc80e680"],"course_features_1_features_list_3_list":["Learn best practices for optimizing security workflows."],"_course_features_1_features_list_3_list":["field_644a0fc80e680"],"course_features_1_features_list":["4"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["<li>To earn this Microsoft Applied Skills credential, learners demonstrate the ability to set up and configure Microsoft Sentinel. <\/li>\r\n\r\n<li>It serves as a credible validation of your skills to potential employers or within your current role. <\/li>\r\n\r\n<li>Applied skills can be utilized to be ready for more specialized or role-based Azure certifications. <\/li>\r\n\r\n<li>We award a certificate of course completion to candidates who pass the SC-5001 training. <\/li>\r\n\r\n<li>After completing the Microsoft SC-5001 course, candidates are awarded a Microsoft credential. <\/li>\r\n\r\n<li>An interactive lab is used to evaluate your performance.<\/li>"],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["17714"],"_certification_0_image":["field_6103ab5b2822e"],"course_section_0_module_title":["Create and manage Microsoft Sentinel workspaces "],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Overview "],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Plan for the Microsoft Sentinel workspace "],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Create a Microsoft Sentinel workspace "],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_3_lession_title":["Manage workspaces across tenants using Azure Lighthouse "],"_course_section_0_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_4_lession_title":["Understand Microsoft Sentinel permissions and roles "],"_course_section_0_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_5_lession_title":["Manage Microsoft Sentinel settings "],"_course_section_0_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_6_lession_title":["Configure logs "],"_course_section_0_section_0_lesson_list_6_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["7"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["1"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Connect Microsoft services to Microsoft Sentinel "],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Overview "],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Plan for Microsoft services connectors "],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Connect the Microsoft Office 365 connector "],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Connect the Microsoft Entra connector "],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_4_lession_title":["Connect the Microsoft Entra ID Protection connector "],"_course_section_1_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_5_lession_title":["Connect the Azure Activity connector "],"_course_section_1_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["6"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["1"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Connect Windows hosts to Microsoft Sentinel "],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Overview "],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["Plan for Windows hosts security events connector "],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Connect using the Windows Security Events via AMA Connector "],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Connect using the Security Events via Legacy Agent Connector "],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Collect Sysmon event logs "],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["5"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["1"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Threat detection with Microsoft Sentinel analytics "],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Overview "],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["What is Microsoft Sentinel Analytics? "],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Types of analytics rules "],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Create an analytics rule from templates "],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Create an analytics rule from wizard "],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_5_lession_title":["Manage analytics rules "],"_course_section_3_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["6"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["1"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Automation in Microsoft Sentinel "],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":[""],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Overview "],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Understand automation options "],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Create automation rules "],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["3"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["1"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Configure SIEM security operations using Microsoft Sentinel (Exercises) "],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section":[""],"_course_section_5_section":["field_612f51e6b0277"],"sale_price_dates_start":[""],"sale_price_dates_end":[""],"_yoast_wpseo_title":["Strengthen Security with Microsoft Sentinel: A Guide to SIEM Configuration"],"_yoast_wpseo_metadesc":["Master SIEM fundamentals and safeguard your organization with Microsoft Sentinel. This guide walks you through configuring security information and event management (SIEM) operations using Sentinel."],"_yoast_wpseo_canonical":["https:\/\/stage.cloudthat.com\/training\/microsoft-security\/configure-siem-security-operations-using-microsoft-sentinel"],"_regular_price_wmcp":["{\"USD\":\"499\",\"GBP\":\"349\",\"BDT\":\"14900\"}"],"_yoast_wpseo_content_score":["90"],"wpdocs-meta-rand":["8799"],"wpdocs-meta-aed":["1800"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20108"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/13"}],"version-history":[{"count":0,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/20108\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/13797"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=20108"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=20108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}