Content Directory
Hyperlinks to each of the lab exercises and demos are listed below.
Labs
Module | Lab |
---|---|
Learning Path 1 - Mitigate threats using Microsoft Defender XDR | Exercise 1 - Explore Microsoft Defender XDR |
Learning Path 2 - Mitigate threats using Microsoft Defender for Endpoint | Exercise 1 - Deploy Microsoft Defender for Endpoint |
Learning Path 2 - Mitigate threats using Microsoft Defender for Endpoint | Exercise 2 - Mitigate Attacks with Microsoft Defender for Endpoint |
Learning Path 3 - Mitigate threats using Microsoft Defender for Cloud | Exercise 1 - Enable Microsoft Defender for Cloud |
Learning Path 3 - Mitigate threats using Microsoft Defender for Cloud | Exercise 2 - Mitigate threats using Microsoft Defender for Cloud |
Learning Path 4 - Create queries for Microsoft Sentinel using Kusto Query Language (KQL) | Exercise 1 - Create queries for Microsoft Sentinel using Kusto Query Language (KQL) |
Learning Path 5 - Configure your Microsoft Sentinel environment | Exercise 1 - Configure your Microsoft Sentinel environment |
Learning Path 6 - Connect logs to Microsoft Sentinel | Exercise 1 - Connect data to Microsoft Sentinel using data connectors |
Learning Path 6 - Connect logs to Microsoft Sentinel | Exercise 2 - Connect Windows devices to Microsoft Sentinel using data connectors |
Learning Path 6 - Connect logs to Microsoft Sentinel | Exercise 3 - Connect Linux hosts to Microsoft Sentinel using data connectors |
Learning Path 6 - Connect logs to Microsoft Sentinel | Exercise 4 - Connect Defender XDR to Microsoft Sentinel using data connectors |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 10 - Create workbooks |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 11 - Use Repositories in Microsoft Sentinel |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 1 - Modify a Microsoft Security rule |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 2 - Create a Playbook |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 3 - Create a Scheduled Query from a template |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 4 - Explore Entity Behavior Analytics |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 5 - Understand Detection Modeling |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 6 - Conduct attacks |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 7 - Create Detections |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 8 - Investigate Incidents |
Learning Path 7 - Create detections and perform investigations using Microsoft Sentinel | Exercise 9 - Create ASIM parsers |
Learning Path 8 - Perform threat hunting in Microsoft Sentinel | Exercise 1 - Perform Threat Hunting in Microsoft Sentinel |
Learning Path 8 - Perform threat hunting in Microsoft Sentinel | Exercise 2 - Threat Hunting using Notebooks with Microsoft Sentinel |