- Level Foundation
-
Offered by
About
Creating a Microsoft Sentinel workspace.Modules
Course introduction
1
Discussions
- What do you hope to learn?
1
Videos
- Introduction to the course
6
Readings
- Course syllabus
- How to be successful in this course
- Microsoft Azure Active Directory name change
- Clean up resources
- How to open an image in a new tab
- Additional resources: Azure basic security capabilities
Distributed Denial of Service (DDoS) Protection
2
Assignment
- Self-review: Create a Windows virtual machine in the Azure portal
- Knowledge check: DDoS Protection
5
Videos
- Azure DDoS Protection overview
- Azure DDoS Protection configuration
- Azure DDoS Protection features and best practices
- Azure and virtual machines
- Spinning up a virtual machine
5
Readings
- Azure DDoS Network Protection in detail
- Exercise: Create a Windows virtual machine in the Azure portal
- Exemplar: Create a Windows virtual machine in the Azure portal
- Clean up resources
- Additional Resources: DDoS Protection
Azure Firewall Protection
2
Assignment
- Self-review: Configure Azure Firewall
- Knowledge check: Azure Firewall protection
7
Videos
- Azure networking
- Introduction to Azure Firewall
- Azure Firewall Standard and Basic
- Web Application Firewall
- Azure Firewall deployment
- Azure Firewall rule configuration
- Hackers and firewalls
5
Readings
- Azure Firewall in depth
- Activity: Resource group & VNet creation
- Exercise: Configure Azure Firewall
- Exemplar: Configure Azure Firewall
- Additional resources: Azure Firewall protection
Just-in-time access and encryption
3
Assignment
- Knowledge check: Just-in-time access and encryption
- Self-review: Secure ports with JIT
- Module quiz: Azure basic security capabilities
4
Videos
- Just-in-time access (JIT)
- Key management and encryption
- Implementing just-in-time access
- Module summary: Azure basic security capabilities
5
Readings
- JIT and encryption
- Best practices for securing Azure resources
- Exercise: Secure ports with JIT
- Exemplar: Secure ports with JIT
- Additional resources: Just-in-time access and encryption
Introduction to cloud security
1
Assignment
- Knowledge check: Introduction to cloud security
4
Videos
- Overview of cloud security
- Advanced cloud security
- Azure security
- Azure security best practices
2
Readings
- Azure security in depth
- Additional resources: Introduction to cloud security
Virtual security solutions
2
Assignment
- Self-review: Shield virtual machines using Bastion
- Knowledge check: Virtual security solutions
3
Videos
- Microsoft Defender interface
- Azure Bastion
- Bastion and virtual machines
3
Readings
- Exercise: Shield virtual machines using Bastion
- Exemplar: Shield virtual machines using Bastion
- Additional resources: Virtual security solutions
Azure standards and policies
1
Assignment
- Knowledge check: Azure Standards and policies
3
Videos
- Introduction to Azure policies
- Custom policy definition
- Azure Blueprints
4
Readings
- Managing Azure policies
- Working with policy definitions in Azure
- Types of policies
- Additional resources: Azure standards and policies
Introduction to SIEM and SOAR
2
Assignment
- Knowledge check: Introduction to SIEM and SOAR
- Module quiz: Security management in Azure
5
Videos
- SIEM
- Microsoft Sentinel
- Microsoft Sentinel data connectors
- Introducing SOAR
- Module summary: Security management in Azure
3
Readings
- Expanding on Sentinel
- SIEM and SOAR use case
- Additional resources: Introduction to SIEM and SOAR
Defender services
2
Assignment
- Self-Review: Implement Microsoft Sentinel with Microsoft Defender data connectors
- Knowledge check: Defender services
4
Videos
- Introduction to Microsoft 365 Defender
- Microsoft 365 Defender portal
- Microsoft 365 Defender incidents and alerts
- Managing users
5
Readings
- Working with Microsoft 365 Defender portal
- Microsoft Defender use-case: Office 365
- Exercise: Implement Microsoft Sentinel with Microsoft Defender data connectors
- Exemplar: Implement Microsoft Sentinel with Microsoft Defender data connectors
- Additional resources: Defender services
Endpoints and cloud apps security
1
Assignment
- Knowledge check: Endpoints and cloud apps security
6
Videos
- Introduction to endpoint security
- Endpoint modernization
- Deployment methods for WaaS and Microsoft 365 Apps
- Defender portal for endpoint capabilities and services
- Threat technologies
- Endpoint encryption
3
Readings
- Defender services in depth
- Next gen antivirus and endpoint response
- Additional resources: Endpoints and cloud apps security
Identity Defense
2
Assignment
- Knowledge check: Identity defense
- Module quiz: Microsoft 365 Defender threat protection
7
Videos
- Introduction to identity defense
- Microsoft Purview
- Azure Active Directory Identity Protection
- Microsoft Defender for Identity
- Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Preparation
- Identity theft
- Module Summary: Microsoft 365 Defender threat protection
3
Readings
- Deploy Microsoft Defender for Identity with Microsoft 365 Defender - Deployment
- Identity Protection in Microsoft 365
- Additional resources: Identity defense
Final project and assessment: Cybersecurity Solutions and Microsoft Defender
2
Assignment
- Self-review: Securing virtual machines
- Course Quiz: Cybersecurity solutions and Microsoft Defender
1
Videos
- Course Recap: Security solutions
4
Readings
- About the final project and assessment: Cybersecurity Solutions and Microsoft Defender
- Exercise: Securing virtual machines
- Exemplar: Securing virtual machines
- Clean up resources
Course wrap-up
1
Discussions
- Reflect on learning
1
Videos
- Congratulations
1
Readings
- Next steps
Auto Summary
Explore the foundational Guide Project 2: SCI – Sentinel course in Business & Management by Coursera. Learn to create a Microsoft Sentinel workspace with our beginner-friendly content. Available with a Starter subscription, perfect for aspiring professionals.