Learn how to implement end-to-end threat protection and incident response using the new unified Microsoft Defender portal. This course equips technical teams to deploy, investigate, automate, and integrate Microsoft Sentinel with Microsoft’s security suite—using a single, streamlined SecOps experience enhanced by AI, UEBA, SOAR, and Security Copilot.
Target Audience - Project Ready
Suggested Certification - SC-200
Hands on Labs - Yes
ESI course code -
Duration - 8 hours
Level - Intermediate
The threat landscape and SOC challenge
Modernize the SOC to defend against the evolving threat landscape
Microsoft Sentinel SIEM Overview
Unified Security Operations with Defender Portal
Planning and Deployment of Microsoft Sentinel SIEM
Sentinel Platform Deployment
Get started with Microsoft Sentinel MCP server and tools
Microsoft Sentinel Graph (Preview) Overview
Onboarding Sentinel to Data Lake and Graph
Sentinel experience in Microsoft Defender portal
Threat intelligence with Microsoft Sentinel in Defender portal
Watchlists overview
User and Entity Behavior Analytics (UEBA)
Enable User and Entity Behavior Analytics (UEBA)
Investigating with UEBA
Microsoft Sentinel Deployment
Enabling Data Connectors in Microsoft Sentinel in Microsoft Defender Portal
Getting a Connector via the Microsoft Security Store
Threat Intelligence connector and Content hub
UEBA with Microsoft Sentinel
Introduction to SOAR in Microsoft Sentinel
Automation with Playbooks and Azure Logic Apps
Customizing Microsoft Sentinel playbooks from templates
Enhance detection with unified engine
Data Analysis and Threat Detection
Threat hunting
Threat Analysis in Microsoft Defender
Integration with Microsoft Defender for Cloud
Integration with Microsoft Defender XDR
Enhance detection with unified engine
Access Control and migration
Microsoft Security Copilot for SOC
Security Copilot agents and Security Store
Investigate incidents in Security Copilot
Manage your unified SOC in Defender portal
Responding to threats using Automation
Hunt threats using KQL across the data lake
Analytics Rules and Incident Management
Hunting queries and Watchlists
Threat hunting with Jupyter notebooks
Exploring Microsoft Sentinel Advanced Features
Repositories in Microsoft Sentinel