Free

Microsoft Sentinel

This course provides a brief introduction to application security, covering fundamental concepts, common vulnerabilities, and basic strategies for securing applications.

5
56
M
Time
intermediate
difficulty
6
ceu/cpe

Course Content

Threat Hunting

16m

Operating with Sentinel: Threat Hunting & Incident Response
Incident Response Playbooks

24m

Defending with Sentinel: Threat Response
Deploying Sentinel

16m

Sentinel Core Concepts: Design & Deployment
Workbooks

19m

Creating with Sentinel: Analytics & Reporting
Instructor's Welcome to Microsoft Sentinel

7m

Introduction: Getting Started with Sentinel
Hunting with Livestream & Bookmarks

11m

Operating with Sentinel: Threat Hunting & Incident Response
Automation Rules

13m

Defending with Sentinel: Threat Response
Onboarding Azure Virtual Machines

18m

Sentinel Core Concepts: Design & Deployment
Analytics Rules

26m

Creating with Sentinel: Analytics & Reporting
Functionality & Features

22m

Introduction: Getting Started with Sentinel
Custom Analytics Rule

16m

Creating with Sentinel: Analytics & Reporting
Challenge Questions

15m

Defending with Sentinel: Threat Response
Incident Response

17m

Operating with Sentinel: Threat Hunting & Incident Response
Onboarding Non-Azure Virtual Machines

13m

Sentinel Core Concepts: Design & Deployment
Sentinel Best Practices

11m

Introduction: Getting Started with Sentinel
Threat Intelligence

10m

Creating with Sentinel: Analytics & Reporting
Challenge Questions

15m

Operating with Sentinel: Threat Hunting & Incident Response
Challenge Questions

5m

Introduction: Getting Started with Sentinel
Onboarding Azure AD Logs

14m

Sentinel Core Concepts: Design & Deployment
Onboarding Network Security Group Logs

23m

Sentinel Core Concepts: Design & Deployment
Challenge Questions

15m

Creating with Sentinel: Analytics & Reporting
Challenge Questions

15m

Sentinel Core Concepts: Design & Deployment
Course Description

Upon completing this course, you should be able to:

  • Define application security and describe its importance.
  • Identify and describe common application vulnerabilities.
  • Identify and describe the stages of the software development lifecycle.
  • Identify and describe secure coding principles.
  • Identify and describe application security testing methods.
This course is part of a Career Path:
No items found.

Instructed by

Instructor
Alex DiMuzio

Alex's specialized areas of interest include network security, cloud security and vulnerability management. He graduated from Temple University with a BBA in Management Information Systems.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Microsoft Sentinel Certificate of Completion