Master Cloud Security with Microsoft Sentinel
Are you ready to level up your cybersecurity skills and take charge of your organization's cloud security posture?
Azure Security Operations with Microsoft Sentinel
An 8-week, hands-on course designed for IT professionals, security analysts, and cloud engineers who want to build real-world expertise in Azure security and master Microsoft Sentinel — Microsoft’s leading SIEM and SOAR solution.
I'm ready!What You’ll Learn:
- How to secure your Azure environment using built-in tools
- How to deploy and manage Microsoft Sentinel like a pro
- Threat detection, investigation, and automated response techniques
- Real-world use cases aligned with MITRE ATT&CK
- Writing advanced KQL queries to unlock powerful insights
- Integrations with Microsoft Defender, firewalls, third-party tools, and more
Duration: 4 weekends (Saturday and Sunday)
- Starting 26th April 2025
- Format: Instructor-led or self-paced
Don’t just learn about security — take control of it.
Secure your spot now and transform the way you detect, investigate, and respond to cyber threats in the cloud!
ENROLL NOW
INTRODUCING
Azure Security Operations with Microsoft Sentinel
Target Audience
- Security Analysts
- SOC Teams
- Cloud Security Engineers
- Azure Administrators
- IT Professionals interested in cloud security
Prerequisites:
- Basic Understanding of cloud computing
- Familiarity with Azure fundamentals
- Basic knowledge of networking and cybersecurity concepts
What's Included In The Bootcamp...
MODULE 1
Introduction to Azure Security
-
Overview of cloud security challenges
-
Azure shared responsibility model
-
Azure security services landscape
-
Identity and access management in Azure (Azure AD, RBAC, Conditional Access)
MODULE 2
Fundamentals of Microsoft Sentinel
-
What is Microsoft Sentinel?
-
Key components and architecture
-
How Sentinel fits into a modern SOC
-
Licensing and cost considerations
MODULE 3
Setting Up Microsoft Sentinel
-
Deploying Microsoft Sentinel
-
Connecting data sources (Azure, on-prem, 3rd party)
-
Understanding workspaces and data ingestion
-
Using built-in connectors (Office 365, Defender, AWS, etc.)
MODULE 4
Kusto Query Language (KQL) for Sentinel
-
Introduction to KQL
-
Writing basic to advanced queries
-
Querying logs and building visualizations
-
Practical exercises with Log Analytics
MODULE 5
Detection and Threat Hunting
-
Creating and managing analytics rules
-
Built-in rule templates vs custom rules
-
Scheduled vs real-time rules
-
Threat hunting use cases and workbooks
-
Using MITRE ATT&CK in Sentinel
MODULE 6
Investigation and Incident Management
-
Investigating incidents in Sentinel
-
Entities and timelines
-
Using investigation graphs
-
Automation with playbooks and Logic Apps
-
Case studies on real-life incident workflows
MODULE 7
Automation and SOAR Capabilities
-
Playbooks and automated response
-
Using Logic Apps for remediation
-
Custom connectors and triggers
-
Best practices for SOAR in Sentinel
MODULE 8
Integrations and Advanced Scenarios
-
Integration with Microsoft Defender (XDR)
-
Third-party integrations (Firewalls, EDRs, etc.)
-
Multi-cloud and hybrid scenarios
-
Role of Sentinel in Zero Trust and compliance
Capstone Project
-
Students build a mini SOC using Sentinel
-
Ingest sample logs, create analytics rules, detect threats
-
Develop a playbook for automated response
-
Present incident response scenario
Assessment & Labs:
-
Weekly hands-on labs in Azure
-
KQL query challenges
-
Threat detection mini-projects
-
Final capstone presentation/report

"Thanks to TCPCYBER Academy, within a span of 9 months, I transitioned from a novice in cybersecurity to confidently securing a GRC Analyst role in a crown corporation."
- Joy Otabor

"The program's blend of theory, hands-on practice, and industry relevance, coupled with instructor's effective teaching style, has created an outstanding learning environment."
- Suraj Aderoju

"One aspect that truly set this course apart was its hands-on approach to learning. The practical exercises and simulations allowed me to apply theoretical knowledge in a controlled environment. This practical exposure was instrumental in solidifying my understanding of various cybersecurity techniques and tools."