Content Directory
Hyperlinks to each of the lab exercises and demos are listed below.
Labs
| Module | Lab |
|---|---|
| Learning Path 1 - Mitigate threats using Microsoft Defender XDR | Exercise 1 - Explore Microsoft Defender XDR |
| Learning Path 2 - Mitigate threats using Microsoft Security Copilot | Exercise 1 - Explore use cases in Microsoft Security Copilot |
| Learning Path 3 - Mitigate threats using Microsoft Purview | Exercise 1 - Explore Microsoft Purview Audit logs |
| Learning Path 4 - Mitigate threats using Microsoft Defender for Endpoint | Exercise 1 - Deploy Microsoft Defender for Endpoint |
| Learning Path 4 - Mitigate threats using Microsoft Defender for Endpoint | Exercise 4 - Mitigate Attacks with Microsoft Defender for Endpoint |
| Learning Path 5 - Mitigate threats using Microsoft Defender for Cloud | Exercise 1 - Enable Microsoft Defender for Cloud |
| Learning Path 5 - Mitigate threats using Microsoft Defender for Cloud | Exercise 2 - Mitigate threats using Microsoft Defender for Cloud |
| Learning Path 6 - Create queries for Microsoft Sentinel using Kusto Query Language (KQL) | Exercise 1 - Create queries for Microsoft Sentinel using Kusto Query Language (KQL) |
| Learning Path 7 - Configure your Microsoft Sentinel environment | Exercise 1 - Configure your Microsoft Sentinel environment |
| Learning Path 8 - Connect logs to Microsoft Sentinel | Exercise 1 - Connect data to Microsoft Sentinel using data connectors |
| Learning Path 8 - Connect logs to Microsoft Sentinel | Exercise 2 - Connect Windows devices to Microsoft Sentinel using data connectors |
| Learning Path 8 - Connect logs to Microsoft Sentinel | Exercise 3 - Connect Linux hosts to Microsoft Sentinel using data connectors |
| Learning Path 8 - Connect logs to Microsoft Sentinel | Exercise 4 - Connect Defender XDR to Microsoft Sentinel using data connectors |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 1 - Modify a Microsoft Security rule |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 2 - Create a Playbook |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 3 - Create a Scheduled Query from a template |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 4 - Explore Entity Behavior Analytics |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 5 - Prepare to perform simulated attacks |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 6 - Conduct attacks |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 7 - Create Detections |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 8 - Investigate Incidents |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 9 - Create ASIM parsers |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 10 - Create workbooks |
| Learning Path 9 - Create detections and perform investigations using Microsoft Sentinel | Exercise 11 - Use Repositories in Microsoft Sentinel |
| Learning Path 10 - Perform threat hunting in Microsoft Sentinel | Exercise 1 - Perform Threat Hunting in Microsoft Sentinel |
| Learning Path 10 - Perform threat hunting in Microsoft Sentinel | Exercise 2 - Threat Hunting using Notebooks with Microsoft Sentinel |