Welcome to Microsoft Sentinel, Microsoft Defender XDR & Threat Protection, a deep-dive course designed for cloud security engineers, SOC analysts, and IT professionals who want to master Microsoft’s advanced detection, response, and threat protection ecosystem.



Microsoft Security Solutions Capabilities
This course is part of Exam Prep SC-900: Microsoft Certified Security Fundamentals Specialization

Instructor: Whizlabs Instructor
Access provided by Tallinn University of Technology
Recommended experience
Details to know

Add to your LinkedIn profile
8 assignments
October 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 3 modules in this course
Welcome to Week 1 of this course! We’ll begin with the essential building blocks for securing Azure workloads. You’ll explore Azure networking security, including Azure DDoS Protection, Azure Bastion, and Azure Firewall, to understand how to defend your resources at the network edge. Next, we’ll dive into network segmentation using Azure Virtual Networks, and configure Network Security Groups (NSG) and Application Security Groups (ASG) with hands-on demos. You’ll also explore Azure Key Vault and see how to secure application secrets and configuration data using App Configuration and Key Vault demos. Finally, we’ll introduce Microsoft Defender for Cloud, its Cloud Security Posture Management (CSPM) capabilities, and workload protection features to help you proactively strengthen your cloud security posture.
What's included
13 videos3 readings3 assignments1 plugin
Welcome to Week 2! this week, we’ll focus on Microsoft Sentinel and its role as a cloud-native SIEM and SOAR solution. You’ll learn how to plan and deploy workspaces, align Sentinel implementation with Microsoft’s Cloud Adoption Framework (CAF) security design phases, and understand the role of SIEM in modern security operations. We’ll then explore Sentinel’s automation capabilities with SOAR, threat detection, and mitigation features. By the end of this week, we’ll dive into threat hunting, reviewing sample KQL queries and walking through a hands-on demo to see how to proactively hunt for threats in your environment.
What's included
8 videos1 reading2 assignments
Welcome to Week 3! this week focuses on governance and identity protection features of Microsoft Entra ID. You’ll explore Privileged Identity Management (PIM) to enforce just-in-time (JIT) access, conduct access reviews, and automate provisioning/deprovisioning. This week also covers Microsoft Entra ID Protection, showing how to detect and mitigate identity risks with real-time monitoring. By the end of the week, you will be able to Configure MFA and passwordless authentication methods, Design Conditional Access policies for secure access and Implement RBAC effectively at tenant, group, or resource scope.
What's included
17 videos3 readings3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Explore more from Information Technology
- Status: AI skills
Microsoft