Eccentrix - Trainings catalog - Microsoft - Security - Configure SIEM security operations using Microsoft Sentinel (SC-5001)

Configure SIEM security operations using Microsoft Sentinel (SC-5001)

Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with automated responses.

Related trainings

Exclusives

  • Technical lab: Available for 180 days of online access
  • Class material: Complete and up to date with Microsoft Learn
  • Proof of attendance: Digital badge for completing the official Microsoft course
  • Fast and guaranteed schedule: Maximum wait of 4 to 6 weeks after participant registrations, guaranteed date

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private classes varies according to the size of your group, with a guaranteed minimum threshold to maintain pedagogical quality.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete proposal with the exact pricing, available dates, and details of all the benefits included in your private training.

Training plan

  • Introduction
  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings
  • Configure logs
  • Introduction
  • Plan for Microsoft services connectors
  • Connect the Microsoft Office 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector
  • Introduction
  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs
  • Introduction
  • Exercise – Detect threats with Microsoft Sentinel analytics
  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules
  • Exercise – Detect threats with Microsoft Sentinel analytics
  • Introduction
  • Understand automation options
  • Create automation rules
  • Introduction
  • Exercise – Configure SIEM operations using Microsoft Sentinel
  • Exercise – Install Microsoft Sentinel Content Hub solutions and data connectors
  • Exercise – Configure a data connector Data Collection Rule
  • Exercise – Perform a simulated attack to validate the Analytic and Automation rules

Recommended prerequisite knowledge

  • Fundamental understanding of Microsoft Azure
  • Basic understanding of Microsoft Sentinel
  • Experience using Kusto Query Language (KQL) in Microsoft Sentinel

Microsoft Sentinel SIEM Training

The Microsoft Sentinel SIEM training offers an in-depth understanding of Microsoft Sentinel, a cloud-based Security Information and Event Management (SIEM) solution. This course teaches security professionals how to configure, manage, and optimize Security Operations Center (SOC) operations using Sentinel while addressing modern cybersecurity challenges.

Ideal for SOC analysts, security administrators, and IT professionals, this training equips you with practical skills to detect, analyze, and respond effectively to security threats in cloud and hybrid environments.

Why Choose the Microsoft Sentinel Training (SC-5001)?

Microsoft Sentinel is a leading SIEM solution that integrates artificial intelligence and machine learning to monitor and analyze security data in real time. With increasingly sophisticated threats, organizations require experts capable of configuring and utilizing advanced tools like Sentinel to secure their systems.

This training prepares you to maximize SOC efficiency by automating threat detection and response processes while ensuring compliance with organizational and regulatory requirements.

Key Skills Developed in the Training

  1. Configure and customize Microsoft Sentinel
    Learn how to deploy Sentinel and integrate data sources for comprehensive monitoring.

  2. Create advanced detection rules
    Configure custom alerts and AI-based analytics to identify suspicious activities.

  3. Automate incident response
    Implement playbooks and automated processes to accelerate threat response.

  4. Optimize analytics and dashboards
    Learn to visualize security data through custom, interactive dashboards.

  5. Integrate Sentinel with existing security solutions
    Discover how to connect Sentinel with other Microsoft and third-party tools for an integrated security ecosystem.

  6. Monitor and respond to threats in real time
    Master techniques to quickly detect, analyze, and neutralize cyberattacks.

Comprehensive, Instructor-Led Training

This training is delivered by Microsoft-certified experts who bring practical experience and real-world scenarios into the classroom. Participants benefit from interactive exercises to apply their skills and prepare to tackle security challenges in real-world environments.

Who Should Attend?

This training is ideal for:

  • SOC analysts responsible for threat monitoring and management
  • Security administrators seeking to enhance their SIEM management skills
  • IT professionals looking to master Microsoft Sentinel in cloud and hybrid environments
  • Organizations aiming to improve the efficiency of their security operations

Strengthen Your SOC Operations with Microsoft Sentinel

The Configuring SIEM Security Operations with Microsoft Sentinel (SC-5001) training provides you with the skills needed to manage and optimize modern SIEM solutions. Enroll today to enhance your threat response capabilities and effectively secure your organization.

Frequently asked questions about the Microsoft Sentinel SC-5001 training (FAQ)

The course covers Sentinel configuration, creating detection rules, automating responses, and analyzing threats.

It is designed for SOC analysts, security administrators, and IT professionals involved in threat management.

A basic understanding of security concepts and experience with Microsoft tools are recommended.

Yes, participants will engage in practical exercises based on real-world scenarios.

You will learn to use Microsoft Sentinel and its integrations with other Microsoft and third-party tools.

It enables you to master Microsoft Sentinel, automate threat responses, and optimize your SOC operations.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: Configure SIEM security operations using Microsoft Sentinel (SC-5001)

Language: English

Duration: 1 day / 7 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
Promotional code
The General Conditions are accessible on this page.