RecertHero
Back to browse
Vendor training·Microsoft LearnVerified

Implement activity and event collection in Microsoft Sentinel

Build a complete event collection and response architecture in Microsoft Sentinel. Set up and secure a Microsoft Sentinel workspace, deploy Content Hub solutions, connect Azure resource data, collect Linux and Windows security events with data collection rules, implement automated response workflows with Logic Apps playbooks, and manage data retention for compliance.

3 hr 38 minSelf-pacedFree

Likely qualifies for

Estimated credit values based on the content of this opportunity. Always verify with your certifying body before claiming.

ISC2High confidence
CCSP+3.75 credits

Directly covers cloud platform security operations, data collection architecture, and compliance management within Microsoft Azure/Sentinel environment.

CompTIAHigh confidence
CySA++3.75 credits

Focuses on event collection, threat detection infrastructure, and incident response automation—core CySA+ competencies in security analytics.

CompTIAMedium confidence
Security++3.5 credits

Covers security tools implementation, data collection, and incident response operations relevant to Security+ architecture and operations domains.

ISACAMedium confidence
CISM+3.25 credits

Addresses security program implementation, data retention/compliance governance, and incident response workflow management aligned with CISM program development.

Credit estimates are RecertHero's best-effort interpretation of the content described. Each certifying body has its own rules — always confirm with the official CPE / CEU policy and keep your own attendance records.

Implement activity and event collection in Microsoft Sentinel — RecertHero