Training agenda

1: Mitigate threats using Microsoft Defender XDR

  Introduction to threat protection with Microsoft Defender XDR

  Mitigate incidents using Microsoft Defender XDR

  Remediate risks with Defender for Office 365 in Microsoft Defender XDR

  Microsoft Defender for Identity in Microsoft Defender XDR

  Protect your identities with Entra ID Protection

  Defender for Cloud Apps in Microsoft Defender XDR

2: Mitigate threats using Microsoft Copilot for Security

  Fundamentals of Generative AI

  Describe Microsoft Copilot for Security

  Describe the core features of Microsoft Copilot for Security

  Describe the embedded experiences of Microsoft Copilot for Security

3: Mitigate threats using Microsoft Purview

  Microsoft Purview Compliance Solutions

  Investigate and remediate compromised entities identified by Microsoft Purview data loss prevention (DLP) policies

  Investigate and remediate insider risk threats identified by Microsoft Purview policies

  Investigate threats using Content search in Microsoft Purview

  Investigate threats using Microsoft Purview Audit (Standard)

  Investigate threats using Microsoft Purview Audit (Premium)

4: Mitigate threats using Microsoft Defender for Endpoint

  Protect against threats with Microsoft Defender for Endpoint

  Deploy the Microsoft Defender for Endpoint environment

  Implement Windows security enhancements

  Perform device investigations

  Perform actions on a device

  Perform evidence and entities investigations

  Configure and manage automation

  Configure for alerts and detections

  Utilize Threat and Vulnerability Management

5: Mitigate threats using Microsoft Defender for Cloud

  Plan for cloud workload protections using Microsoft Defender for Cloud

  Connect Azure assets to Microsoft Defender for Cloud

  Connect non-Azure assets to Microsoft Defender for Cloud

  Manage your cloud security posture management

  Workload protections in Microsoft Defender for Cloud

  Remediate security alerts using Microsoft Defender for Cloud

6: Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

  Construct KQL statements for Microsoft Sentinel

  Analyze query results using KQL

  Build multi-table statements using KQL

  Work with string data in using KQL statements

7: Configure your Microsoft Sentinel environment

  Introduction to Microsoft Sentinel

  Create and manage Microsoft Sentinel workspaces

  Query logs in Microsoft Sentinel

  Use watchlists in Microsoft Sentinel

  Utilize threat intelligence in Microsoft Sentinel

8: Connect logs to Microsoft Sentinel

  Manage content in Microsoft Sentinel

  Connect data to Microsoft Sentinel using data connectors

  Connect Microsoft services to Microsoft Sentinel

  Connect Microsoft Defender XDR to Microsoft Sentinel

  Connect Windows hosts to Microsoft Sentinel

  Connect Common Event Format logs to Microsoft Sentinel

  Connect syslog data sources to Microsoft Sentinel

  Connect threat indicators to Microsoft Sentinel

9: Create detections and perform investigations using Microsoft Sentinel

  Threat detection with Microsoft Sentinel analytics

  Automation in Microsoft Sentinel

  Threat response with Microsoft Sentinel playbooks

  Security incident management in Microsoft Sentinel

  Entity behavioral analytics in Microsoft Sentinel

  Data normalization in Microsoft Sentinel

  Query, visualize, and monitor data in Microsoft Sentinel

10: Perform threat hunting in Microsoft Sentinel

  Explain threat hunting concepts in Microsoft Sentinel

  Threat hunting with Microsoft Sentinel

  Use Search jobs in Microsoft Sentinel

  Optional – Hunt for threats using notebooks in Microsoft Sentinel