- Level Foundation
 - المدة
 - 
									Offered by
																			
																	 
عن
Creating a Microsoft Sentinel workspace.الوحدات
Course introduction
													1
													Discussions
- What do you hope to learn?
 
													1
													Videos
- Introduction to the course
 
6
													Readings
- Course syllabus
 - How to be successful in this course
 - Microsoft Azure Active Directory name change
 - Clean up resources
 - How to open an image in a new tab
 - Additional resources: Azure basic security capabilities
 
Distributed Denial of Service (DDoS) Protection
													2
													Assignment
- Self-review: Create a Windows virtual machine in the Azure portal
 - Knowledge check: DDoS Protection
 
													5
													Videos
- Azure DDoS Protection overview
 - Azure DDoS Protection configuration
 - Azure DDoS Protection features and best practices
 - Azure and virtual machines
 - Spinning up a virtual machine
 
5
													Readings
- Azure DDoS Network Protection in detail
 - Exercise: Create a Windows virtual machine in the Azure portal
 - Exemplar: Create a Windows virtual machine in the Azure portal
 - Clean up resources
 - Additional Resources: DDoS Protection
 
Azure Firewall Protection
													2
													Assignment
- Self-review: Configure Azure Firewall
 - Knowledge check: Azure Firewall protection
 
													7
													Videos
- Azure networking
 - Introduction to Azure Firewall
 - Azure Firewall Standard and Basic
 - Web Application Firewall
 - Azure Firewall deployment
 - Azure Firewall rule configuration
 - Hackers and firewalls
 
5
													Readings
- Azure Firewall in depth
 - Activity: Resource group & VNet creation
 - Exercise: Configure Azure Firewall
 - Exemplar: Configure Azure Firewall
 - Additional resources: Azure Firewall protection
 
Just-in-time access and encryption
													3
													Assignment
- Knowledge check: Just-in-time access and encryption
 - Self-review: Secure ports with JIT
 - Module quiz: Azure basic security capabilities
 
													4
													Videos
- Just-in-time access (JIT)
 - Key management and encryption
 - Implementing just-in-time access
 - Module summary: Azure basic security capabilities
 
5
													Readings
- JIT and encryption
 - Best practices for securing Azure resources
 - Exercise: Secure ports with JIT
 - Exemplar: Secure ports with JIT
 - Additional resources: Just-in-time access and encryption
 
Introduction to cloud security
													1
													Assignment
- Knowledge check: Introduction to cloud security
 
													4
													Videos
- Overview of cloud security
 - Advanced cloud security
 - Azure security
 - Azure security best practices
 
2
													Readings
- Azure security in depth
 - Additional resources: Introduction to cloud security
 
Virtual security solutions
													2
													Assignment
- Self-review: Shield virtual machines using Bastion
 - Knowledge check: Virtual security solutions
 
													3
													Videos
- Microsoft Defender interface
 - Azure Bastion
 - Bastion and virtual machines
 
3
													Readings
- Exercise: Shield virtual machines using Bastion
 - Exemplar: Shield virtual machines using Bastion
 - Additional resources: Virtual security solutions
 
Azure standards and policies
													1
													Assignment
- Knowledge check: Azure Standards and policies
 
													3
													Videos
- Introduction to Azure policies
 - Custom policy definition
 - Azure Blueprints
 
4
													Readings
- Managing Azure policies
 - Working with policy definitions in Azure
 - Types of policies
 - Additional resources: Azure standards and policies
 
Introduction to SIEM and SOAR
													2
													Assignment
- Knowledge check: Introduction to SIEM and SOAR
 - Module quiz: Security management in Azure
 
													5
													Videos
- SIEM
 - Microsoft Sentinel
 - Microsoft Sentinel data connectors
 - Introducing SOAR
 - Module summary: Security management in Azure
 
3
													Readings
- Expanding on Sentinel
 - SIEM and SOAR use case
 - Additional resources: Introduction to SIEM and SOAR
 
Defender services
													2
													Assignment
- Self-Review: Implement Microsoft Sentinel with Microsoft Defender data connectors
 - Knowledge check: Defender services
 
													4
													Videos
- Introduction to Microsoft 365 Defender
 - Microsoft 365 Defender portal
 - Microsoft 365 Defender incidents and alerts
 - Managing users
 
5
													Readings
- Working with Microsoft 365 Defender portal
 - Microsoft Defender use-case: Office 365
 - Exercise: Implement Microsoft Sentinel with Microsoft Defender data connectors
 - Exemplar: Implement Microsoft Sentinel with Microsoft Defender data connectors
 - Additional resources: Defender services
 
Endpoints and cloud apps security
													1
													Assignment
- Knowledge check: Endpoints and cloud apps security
 
													6
													Videos
- Introduction to endpoint security
 - Endpoint modernization
 - Deployment methods for WaaS and Microsoft 365 Apps
 - Defender portal for endpoint capabilities and services
 - Threat technologies
 - Endpoint encryption
 
3
													Readings
- Defender services in depth
 - Next gen antivirus and endpoint response
 - Additional resources: Endpoints and cloud apps security
 
Identity Defense
													2
													Assignment
- Knowledge check: Identity defense
 - Module quiz: Microsoft 365 Defender threat protection
 
													7
													Videos
- Introduction to identity defense
 - Microsoft Purview
 - Azure Active Directory Identity Protection
 - Microsoft Defender for Identity
 - Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Preparation
 - Identity theft
 - Module Summary: Microsoft 365 Defender threat protection
 
3
													Readings
- Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Deployment
 - Identity Protection in Microsoft 365
 - Additional resources: Identity defense
 
Final project and assessment: Cybersecurity Solutions and Microsoft Defender
													2
													Assignment
- Self-review: Securing virtual machines
 - Course Quiz: Cybersecurity solutions and Microsoft Defender
 
													1
													Videos
- Course Recap: Security solutions
 
4
													Readings
- About the final project and assessment: Cybersecurity Solutions and Microsoft Defender
 - Exercise: Securing virtual machines
 - Exemplar: Securing virtual machines
 - Clean up resources
 
Course wrap-up
													1
													Discussions
- Reflect on learning
 
													1
													Videos
- Congratulations
 
1
													Readings
- Next steps
 
Auto Summary
Explore the foundational Guide Project 2: SCI – Sentinel course in Business & Management by Coursera. Learn to create a Microsoft Sentinel workspace with our beginner-friendly content. Available with a Starter subscription, perfect for aspiring professionals.