Skip to content Skip to sidebar Skip to footer

A Guide to Security Information and Event Management - SIEM

A Guide to Security Information and Event Management - SIEM
Link : best A Guide to Security Information and udemy course Event Management - SIEM
Security information and event management (SIEM) software gives enterprise security professionals both insight into and a track record of the  event manager
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!

What you'll learn

  • In this course you will go through an Introduction to SIEM, its Key Objectives, Defence in Depth, Corporate environment, Log Management, Why SIEM is necessary, Use cases, elements of SIEM, big 3 for SIEM, SIEM process flow, typical features of SIEM, event life cycle, SOC controls and management, SIEM architecture, 8 critical features of SIEM, SIEM deployment options, Why SIEM implementation fails and the business benefits
  • You will get an introduction to Splunk's user interface and will be conversant with the UI post this session. We cover Navigating splunk web: splunk home, splunk bar, splunk web,getting date into splunk, how to specify data inputs, where splunk stores data, getting tutorial data into splunk, using splunk search, search actions and modes, search results tools, events, what are fields, extracted fields, find and select fields,run more targeted searches, use the search language and learn with search assistant.
  • Start using Splunk's basic transforming commands and create reports, dashboards and alerts.
  • You will start using Splunk Enterprise Security
  • You will learn the different types of viruses: Boot sector, Program, Macro
  • You will also learn types other than viruses: Virus Hoaxes, Trojan Horses, Worms, Spam, Adware, Spyware
  • You will have clarity on what an Anti-Virus is, types of Anti-Virus products, how does Anti-virus work and examples of Anti-virus software's
  • Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices.
  • Email: SMTP, Email system, webmail architecture - IMAP4 based, Email based attacks - social engineering, proxy server
  • Cyber security incidence response: what is it?, examples, purpose of incident response, cyber security incidents, meantime to resolution, incident management process, Logs from security monitoring and logging tools, Detection, Prevention and Protection
  • Understand and Manage Vulnerabilities

Description
In this course you will go through an Introduction to SIEM, its Key objectives, Defence in depth, Corporate environment, Log management, Why siem is necessary, Use cases, Elements of siem, Big 3 for siem, SIEM process flow, Typical features of siem, Event life cycle, Soc controls and Management, SIEM Architecture, 8 critical features of SIEM and SIEM Deployment options. You will also get an introduction to Splunk's user interface and will be conversant with the UI. You can start using the Splunk's basic transforming commands, can create reports and dashboards, you will know how to save and share reports and also can create alerts.
Online Course CoupoNED
Online Course CoupoNED I am very happy that there are bloggers who can help my business

Post a Comment for "A Guide to Security Information and Event Management - SIEM"

Subscribe via Email