WSQ , IBF, SkillsFuture, PEI Approved Training Provider

SC-5001 Configure SIEM Security Operations Using Microsoft Sentinel

This course provides in-depth training on configuring SIEM security operations using Microsoft Sentinel. Learn how to create and manage Sentinel workspaces, connect Microsoft services and Windows hosts, and utilize analytics for threat detection. Gain hands-on experience in configuring data connectors, setting up security event monitoring, and implementing automation rules for efficient threat response. Understand how to integrate Microsoft 365, Entra, and Azure Activity connectors to enhance security visibility across environments.

Through practical exercises, you will create analytics rules, automate security responses, and validate SIEM operations with simulated attacks. This course is ideal for cybersecurity professionals, SOC analysts, and IT security teams looking to strengthen their skills in Microsoft Sentinel. By the end of the training, you will be equipped to detect, analyze, and respond to security threats effectively using Microsoft Sentinel’s advanced capabilities.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant Applications

No funding is available for this course

Course Code: C165

Fee

$350.00 (GST-exclusive)
$381.50 (GST-inclusive)

The course fee listed above is before subsidy/grant, if applicable. We will apply for the grant and send you the invoice with nett fee.

Course Date

Course Time

* Required Fields

Post-Course Support

  • We provide free consultation related to the subject matter after the course.
  • Please email your queries to enquiry@tertiaryinfotech.com and we will forward your queries to the subject matter experts.

Course Cancellation/Reschedule Policy

  • You can register your interest without upfront payment. There is no penalty for withdrawal of the course before the class commerce.
  • We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% for any paid amount.
  • Note the venue of the training is subject to changes due to availability of the classroom

Course Details

Topic 1 Create and manage Microsoft Sentinel workspaces

  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings

Topic 2 Connect Microsoft services to Microsoft Sentinel

  • Plan for Microsoft services connectors
  • Connect the Microsoft 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector

Topic 3 Connect Windows hosts to Microsoft Sentinel

  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs

Topic 4 Threat detection with Microsoft Sentinel analytics

  • Detect threats with Microsoft Sentinel analytics
  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules
  • Detect threats with Microsoft Sentinel analytics

Topic 5 Automation in Microsoft Sentinel

  • Understand automation options
  • Create automation rules

Topic 6 Configure SIEM security operations using Microsoft Sentinel

  • Configure SIEM operations using Microsoft Sentinel
  • Install Microsoft Sentinel Content Hub solutions and data connectors
  • Configure a data connector Data Collection Rule
  • Perform a simulated attack to validate the Analytic and Automation rules

Course Info

Promotion Code

Your will get 10% discount voucher for 2nd course onwards if you write us a Google review.

Minimum Entry Requirement

Knowledge and Skills

  • Able to operate using computer functions
  • Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)

Attitude

  • Positive Learning Attitude
  • Enthusiastic Learner

Experience

  • Minimum of 1 year of working experience.

Target Age Group: 18-65 years old

Minimum Software/Hardware Requirement

Software:

TBD

Hardware: Window or Mac Laptops

Job Roles

  • Cybersecurity Analyst
  • SOC Analyst
  • Security Engineer
  • Threat Intelligence Analyst
  • SIEM Engineer
  • Incident Response Specialist
  • Cloud Security Engineer
  • Microsoft Security Consultant
  • Security Operations Manager
  • Information Security Analyst
  • Azure Security Engineer
  • Security Architect
  • IT Security Administrator
  • Cyber Defense Analyst
  • Security Automation Engineer
  • Vulnerability Management Specialist
  • IT Risk and Compliance Manager
  • Security Threat Analyst
  • Enterprise Security Engineer
  • Security Compliance Officer

Trainers

Belinda Gan: Belinda graduated from Nanyang Academy of Fine Arts (NAFA) in 2017 with a diploma in Furniture & Spatial Design. With 3 years of training in software skills , mainly Photoshop , Illustrator , Rhinoceros , Inventor ,T spline, Autocad and Vray. Belinda works with softer and rounder forms that are more challenging to create . Also more towards graphic design in Photoshop and Illustrator for most occasions.

Tan Jun Yuan: Tan Jun Yuan is a practicing designer with over 6 years’ experience. His focus is in product visualization - translating sketch concepts to actual 3D models for prototyping and presentation. He uses a combination of tools such as Rhino, vray, photoshop and illustrator to present these ideas in a photo realistic manner. He is always happy to share his tips and best practices on how to use these software

 

Customer Reviews (11)

will rcommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
I think this is good enough and trainer was also able to assist on our queries (Posted on 12/5/2023)
Instructor was very nice and helpful Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Instructor was very nice and helpful (Posted on 5/4/2022)
Very good already Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Trainer was very knowledgeable n shared valuable methods n tips on how to use Rhino 6 effectively. Really enjoyed the lesson n thankful for all the helpful sharing (Posted on 10/26/2021)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Chairs can be more ergonomic and comfortable, especially for full day courses. Provide practice questions with optimal solutions for students to do at their own time to become more familiar with concepts and software post-course.

Class was small and more personalized, great for beginners who have questions and need some hand holding along the way. Information was sufficient for beginners to Rhino (Posted on 1/4/2018)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Great. (Posted on 8/3/2017)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More lesson, more in depth of rhino tools. However this lesson is very beneficial (Posted on 5/2/2017)
Lessons are concise and there is sufficient hands-on exercises Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Perhaps split the lesson into 2 days so that the lessons can be more indepth (Posted on 9/26/2016)
Might Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More days instead of cramping everything into one session so the course can be more in depth. Can consider an advanced course. (Posted on 9/26/2016)
Might consider recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Too cold. Air flow directly from the top. After few hours, my hand numb. Limited space. (Posted on 6/23/2016)
Training is good and well delivered Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
With the condensed schedule I would suggest the training manuals/pamplets can be send in advance.

Also a trainee expectation before the actual day of training.

The Instructor is well versed of the software and communicates very well and approachable. (Posted on 6/22/2016)
review Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Friendly and helpful trainer:) maybe the course can longer, let say 3 - 4 days and split the beginners from the experience. (Posted on 6/22/2016)

Write Your Own Review

You're reviewing: SC-5001 Configure SIEM Security Operations Using Microsoft Sentinel

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses

WSQ - Microsoft Security Operations Analyst (SC-200)

WSQ - Microsoft Security Operations Analyst (SC-200)

8 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Microsoft Cybersecurity Architect (SC-100) Training

WSQ - Microsoft Cybersecurity Architect (SC-100) Training

2 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Pearson Vue Certified IT Specialist Network Security Training

WSQ - Pearson Vue Certified IT Specialist Network Security Training

$1,000.00 (GST-exclusive)
$1,090.00 (GST-inclusive)
WSQ - ISC2 Information Systems Security Professional (CISSP) Training

WSQ - ISC2 Information Systems Security Professional (CISSP) Training

15 Review(s)
$3,500.00 (GST-exclusive)
$3,815.00 (GST-inclusive)
WSQ - CompTIA Cybersecurity Analyst (CySA+) Training

WSQ - CompTIA Cybersecurity Analyst (CySA+) Training

$2,500.00 (GST-exclusive)
$2,725.00 (GST-inclusive)
WSQ - Cyber Security Awareness Course for Personal and Businesses

WSQ - Cyber Security Awareness Course for Personal and Businesses

230 Review(s)
$350.00 (GST-exclusive)
$381.50 (GST-inclusive)
WSQ - CompTIA Certified Security+ Training

WSQ - CompTIA Certified Security+ Training

4 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)
WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

WSQ - Microsoft Azure Security Engineer Associate (AZ-500)

1 Review(s)
$2,000.00 (GST-exclusive)
$2,180.00 (GST-inclusive)