lt;pgt;Updated for 2022, our immersive 2-day Defending Enterprises training is the natural counterpart to our popular Hacking Enterprises course. From SIEM configuration oversight to monitoring, alerting and threat hunting, youamp;rsquo;ll play a SOC analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOAamp;rsquo;s and IOCamp;rsquo;s from a live enterprise breach executed by the trainers in real time.lt;/pgt;lt;pgt;Whether youamp;rsquo;re new to Kusto Query Language (KQL) or a seasoned pro, thereamp;rsquo;s plenty for you in the 2-days! Yes, weamp;rsquo;re using Microsoft Sentinel, but the underlying threat detection theory, logic and threat hunting approach is transferable into your own environments, whatever your preferred platform is. We look at the top 10 methods we use in offensive engagements and show how these can be caught, along with numerous other examples and methods that go above and beyond these common TTPs!lt;/pgt;