Call +233 55 050 3980 Email: info@tertiarycourses.com.gh

Best Cyber Security and AI Trainings in Ghana

SC-5001 Configure SIEM Security Operations Using Microsoft Sentinel

This course provides in-depth training on configuring SIEM security operations using Microsoft Sentinel. Learn how to create and manage Sentinel workspaces, connect Microsoft services and Windows hosts, and utilize analytics for threat detection. Gain hands-on experience in configuring data connectors, setting up security event monitoring, and implementing automation rules for efficient threat response. Understand how to integrate Microsoft 365, Entra, and Azure Activity connectors to enhance security visibility across environments.

Through practical exercises, you will create analytics rules, automate security responses, and validate SIEM operations with simulated attacks. This course is ideal for cybersecurity professionals, SOC analysts, and IT security teams looking to strengthen their skills in Microsoft Sentinel. By the end of the training, you will be equipped to detect, analyze, and respond to security threats effectively using Microsoft Sentinel’s advanced capabilities.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Disclaimer

We are not affiliated with McNeel Asia and Rhino This course does not certify that you as Certified Rhino Professional. We use Rhino only for the training of this course .

Course Code: M334

Fee

₵2,000.00

Course Date

Course Time

* Required Fields

Post-Course Support

We provide free consultation related to the subject matter after the course. Please email your queries to info@tertiarycourses.com.gh and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.

Course Details

Topic 1 Create and manage Microsoft Sentinel workspaces

  • Plan for the Microsoft Sentinel workspace
  • Create a Microsoft Sentinel workspace
  • Manage workspaces across tenants using Azure Lighthouse
  • Understand Microsoft Sentinel permissions and roles
  • Manage Microsoft Sentinel settings

Topic 2 Connect Microsoft services to Microsoft Sentinel

  • Plan for Microsoft services connectors
  • Connect the Microsoft 365 connector
  • Connect the Microsoft Entra connector
  • Connect the Microsoft Entra ID Protection connector
  • Connect the Azure Activity connector

Topic 3 Connect Windows hosts to Microsoft Sentinel

  • Plan for Windows hosts security events connector
  • Connect using the Windows Security Events via AMA Connector
  • Connect using the Security Events via Legacy Agent Connector
  • Collect Sysmon event logs

Topic 4 Threat detection with Microsoft Sentinel analytics

  • Detect threats with Microsoft Sentinel analytics
  • What is Microsoft Sentinel Analytics?
  • Types of analytics rules
  • Create an analytics rule from templates
  • Create an analytics rule from wizard
  • Manage analytics rules
  • Detect threats with Microsoft Sentinel analytics

Topic 5 Automation in Microsoft Sentinel

  • Understand automation options
  • Create automation rules

Topic 6 Configure SIEM security operations using Microsoft Sentinel

  • Configure SIEM operations using Microsoft Sentinel
  • Install Microsoft Sentinel Content Hub solutions and data connectors
  • Configure a data connector Data Collection Rule
  • Perform a simulated attack to validate the Analytic and Automation rules

Course Info

HRDF Funding

Please refer to this video https://youtu.be/Kzpd-V1F9Xs

1-     HRD Corp Grant Helper

How to submit grant applications for HRD Corp Claimable Courses

2-     Employers are required to apply for the grant at least one week before training commences.

Employers must submit their applications with supporting documents, including invoices/quotations, trainer profiles, training schedule and course content.

3-     First, Login to Employer’s e-TRIS account -https://etris.hrdcorp.gov.my

Second, Click Application

4-     Click Grant on the left side under Applications

5-     Click Apply Grant on the left side under Applications

6-     Click Apply

7-     Choose a Scheme Code and select HRD Corp Claimable Courses: Skim Bantuan Latihan Khas. Then, click Apply

8-     Scheme Code represents all types of training that suit the requirements provided by HRD Corp. Below are the list of schemes offered by HRD Corp:

9-     Select your Immediate Officer and click Next

10-  Select a Training Provider, then click Next

11-  Please select a training programme from the list, then key in all the required details and click Next

Select your desired training programme.

Give an explanation on why the participant is required to attend the training. E.g., related to their tasks/ career development, etc.

Explain the background and objective of this training.

Select a relevant focus area. For Employer-Specific Courses, select ‘Not Applicable’.

12-  If the training programme is a micro-credential programme, you are required to complete these 3 fields. Save and click Next

Insert MiCAS Application number

13-  Based on the nine (9) pillars listed below, HRD Corp Focus Area Courses are closely tied to support government initiatives towards nation building. As such, courses offered through the HRD Corp Focus Areas are designed to provide the workforce with skills required for current and future demands. Details of the focus areas are as follows:

14-  Please select a Course Title and Type of Training

15-  Select the correct type of training according to the actual type of training, or as mentioned in the training brochure:

16-  Please key in the Training Location and click Next

17-  Please select the Level of Certification and click Next

18-  Please follow the instructions and key in trainee details

19-  Click Add Batch, then click Save

20-  Click Add Trainee Details

21-  Please key in all the required details, then click Add

22-  Click Add if there are more participants. Once done, click Save

23-  Click Next

24-  Please key in the course fees and allowance details, then click Save

25-  Estimated cost includes the course fees/external trainer fees, allowances, and consumable training materials. Please comply with the HRD Corp Allowable Cost Matrix.

26-  Select Upfront Payment to Training Provider and key in the percentage from 0% to 30%. Then, click Save and Next

27-  Complete the declaration form and select a desired officer

28-  Add all the required documents, then click Add Attachment. Then, click Save and Submit Application

29-  Once the New Grant Application is successfully submitted, the Grant Officer will evaluate the application accordingly. The application may be queried if additional information is required.

The application status will be updated via the employer’s dashboard, email, and the e-TRiS inbox.

Job Roles

  • Cybersecurity Analyst
  • SOC Analyst
  • Security Engineer
  • Threat Intelligence Analyst
  • SIEM Engineer
  • Incident Response Specialist
  • Cloud Security Engineer
  • Microsoft Security Consultant
  • Security Operations Manager
  • Information Security Analyst
  • Azure Security Engineer
  • Security Architect
  • IT Security Administrator
  • Cyber Defense Analyst
  • Security Automation Engineer
  • Vulnerability Management Specialist
  • IT Risk and Compliance Manager
  • Security Threat Analyst
  • Enterprise Security Engineer
  • Security Compliance Officer

Trainers

Dr. Muhammed Siraj is a seasoned IT and cyber security professional with over 20 years of experience in higher education, ICT leadership, and digital transformation. As the Acting Director of ICT at Wisconsin International University College, Ghana, he oversees the university’s information security program, implementing robust security controls, monitoring incidents, and ensuring compliance with regulatory requirements. His expertise is reinforced by globally recognized certifications, including Certified Ethical Hacker (CEH) and Certified Hacking and Forensic Investigator (CHFI), alongside extensive hands-on experience in cyber security operations, fraud detection, and digital forensics

In addition to his leadership roles, Dr. Siraj is a cyber security and forensics instructor who has trained diverse groups ranging from law enforcement officers and customs officials to bankers and IT professionals. He has developed and delivered specialized courses in cyber security, fraud investigation, and digital forensics, while also mentoring students and IT teams in secure system administration, penetration testing, and blockchain security. With a research background in blockchain security and consensus mechanisms, he combines academic rigor with practical expertise, making him a trusted authority in safeguarding digital infrastructures and preparing the next generation of cyber security professionals

Write Your Own Review

You're reviewing: SC-5001 Configure SIEM Security Operations Using Microsoft Sentinel

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses