Masterclass: SOC Analyst Course

    Seminarinhalt

    The course is dedicated for people who want to learn about Microsoft's cloud environment monitoring tools and framework. At the beginning, we will introduce you to the management of Azure Active Directory, service auditing and logs, roles related to monitoring threats in the cloud, or the implementation of PIM and PAM services.
    In the next module we will walk through cloud security configuration best practices with secure score, Azure Defender for servers or security standards recommendations.
    During the course you will be able to configure an environment with EDR enabled, where we will try to attack endpoints and user identity and see how EDR behaves. Then we will go through security operations best practices and make hunting queries.
    The implemented EDR solution and other components of the security stack will be linked within the Microsoft SIEM, which will allow monitoring and implementation of responses to threats.

    Programm

    Module 1: Monitoring operations in Azure AD
    • Azure Active Directory Operations and Logs
    • Azure AD Roles
    • Identity Protection – Roles, Review access, alerts, Discovery and Insights
    • How to deal with Audit Log
    • Challenging Azure AD settings in Azure and Office from red team perspective
    • Privileged Identity Management – JITA, Discover and Monitor
    • Office Management API – Logs around Office 365
    • Microsoft Azure Policies – getting started, compliance, remediation, assignments, blueprints
    • Labs

    Module 2: Microsoft 365 security
    • Secure Score and Security Center
    • Best Practices for Improving Your Secure Score
    • Azure Defender for Servers
    • Security Benchmark Policy
    • Labs
    • STIG & CIS – cloud security baseline

    Module 3: Microsoft 365 Defender for Endpoint – EDR
    • Intro 101 (configuration, device inventory, concept, Report, alerts) and EDR deployment
    • Security Operations best practices with Microsoft EDR
    • How to manage Incidents
    • Kusto language 101 – basic and advanced queries
    • Advanced Hunting
    • Partner & APIs
    • Hacker ways to hide malware and bypass EDR
    • Attacks examples and remediation labs
    • EDR Integration with Microsoft Defender for Identity
    • EDR Integration with Microsoft Defender for Office 365

    Module 4: Extended Detection and Response with Sentinel
    • Sentinel 101 - Azure Sentinel Dashboards, Connectors
    • Understanding Normalization in Azure Sentinel
    • Cloud & on-prem architecture
    • Workbooks deep dive - Visualize your security threats and hunts
    • Incidents
    • KQL intro (KQL hands-on lab exercises) and Optimizing Azure Sentinel KQL queries performance
    • Auditing and monitoring your Azure Sentinel workspace
    • Sentinel configuration with Microsoft Cloud stack, EDR and MCAS
    • Fusion ML Detections with Scheduled Analytics Rules
    • Streamlining your SOC Workflow with Automated Notebooks
    • Customizing Azure Sentinel with Python
    • Best Practices for Converting Detection Rules from Splunk, QRadar, and ArcSight to Azure Sentinel Rules
    • Deep Dive into Azure Sentinel Innovations
    • Investigating Azure Security Center alerts using Azure Sentinel
    • Customizable Anomalies and How to Use Them
    • Introduction to Monitoring SAP with Azure Sentinel for Security Professionals
    • Hunting in Sentinel
    • Deep Dive on Threat Intelligence
    • End-to-End SOC scenario with Sentinel

    Module 5: Microsoft Cloud App Security
    • Intro do MCAS
    • Enabling Secure Remote Work
    • App Discovery and Log Collector Configuration
    • Extending real-time monitoring & controls to any app
    • Connecting 3rd party Applications
    • Automation and integration with Microsoft Flow
    • Conditional Access App Control
    • Threat detection
    • Information Protection
    • Labs: Protect Your Environment Using MCAS
    • DLP in Microsoft stack – how to deploy and monitor using MCAS and Sentinel

    Zielgruppen

    • SOC analysts
    • Enterprise administrators
    • infrastructure architects
    • security professionals
    • systems engineers
    • network administrators
    • IT professionals
    • security consultants and other people responsible for implementing network and perimeter security.

    Vorkenntnisse

    To attend this training, you should have a good hands-on experience in administering Windows infrastructure and basic around public cloud concept (Office 365, Azure).

    Wichtige Information

    Dieses Training wird in ENGLISCH gehalten!

    Downloads

      5 Tage ab  3.600,-
      Termin wählen
      Trainings-ID:
      SOC
      Ort:
      Online

      Jetzt buchen

      • 12.05.-16.05.2025 12.05.2025 5 Tage 5T Online ab  3.600,-

          Trainingspreis

           3.600,-
        • Trainingspreis Online  3.600,-
      • 15.09.-19.09.2025 15.09.2025 5 Tage 5T Online ab  3.600,-

          Trainingspreis

           3.600,-
        • Trainingspreis Online  3.600,-
      • 01.12.-05.12.2025 01.12.2025 5 Tage 5T Online ab  3.600,-

          Trainingspreis

           3.600,-
        • Trainingspreis Online  3.600,-

      Sie haben Fragen?

      Ihr ETC Support

      Kontaktieren Sie uns!

      +43 1 533 1777-99

      This field is hidden when viewing the form
      This field is hidden when viewing the form
      This field is hidden when viewing the form

      Was ist die ETC-Wissensgarantie?

      Sie möchten Ihr Seminar noch einmal besuchen? Die ETC-Wissensgarantie macht es möglich! Ob im Krankheitsfall, bei Planänderung im Unternehmen oder um Ihr Trainings-Knowhow aufzufrischen: Besuchen Sie dazu Ihr Training innerhalb von bis zu 12 Monaten nochmals kostenlos! Ohne Stornokosten oder sonstiger Zusatzstress.

      Weitere Infos

      Lernformen im Überblick

      Mehr darüber