Azure Sentinel helps to collect, detect, investigate and respond to security threats and incidents. Thus, delivering intelligent security analytics and threat intelligence across the enterprise ecosystem. Azure Sentinel natively incorporates Azure Logic Apps and Log Analytics that enhances its capabilities. It also has built-in advanced machine learning capabilities that can detect actors of threats and suspicious Behaviors that can significantly help security analysts to analyze their environment.

The core objective of the session is understanding Microsoft Sentinel association with Log Analytics. Key aspects of the session would be exploring Data Connectors and using Azure Activity

Skills Covered

  • Understanding Microsoft Sentinel association with Log Analytics

Who Should Attend

This course is for Azure Security Engineers who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization’s data.

Course Curriculum


  •  Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
  •  Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
  •  Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
  •  Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.

Download Syllabus

Course Modules

Request More Information

Training Options

Intake: Available Upon Request
Duration: 1 Day
Guaranteed: TBC
Modality: VILT

RM1,200.00Enroll Now