A Guide to Security Information and Event Management - SIEM

A Guide to Security Information and Event Management - SIEM

https://www.udemy.com/course/a-guide-to-security-information-and-event-management-siem/

Gain hands-on Tool insights using Splunk on Security information and event management and Security event manager


 

What you'll learn

In this course you will go through an Introduction to SIEM, its Key Objectives, Defence in Depth, Corporate environment, Log Management, Why SIEM is necessary, Use cases, elements of SIEM, big 3 for SIEM, SIEM process flow, typical features of SIEM, event life cycle, SOC controls and management, SIEM architecture, 8 critical features of SIEM, SIEM deployment options, Why SIEM implementation fails and the business benefits

You will get an introduction to Splunk's user interface and will be conversant with the UI post this session. We cover Navigating splunk web: splunk home, splunk bar, splunk web,getting date into splunk, how to specify data inputs, where splunk stores data, getting tutorial data into splunk, using splunk search, search actions and modes, search results tools, events, what are fields, extracted fields, find and select fields,run more targeted searches, use the search language and learn with search assistant.

Start using Splunk's basic transforming commands and create reports, dashboards and alerts.

You will start using Splunk Enterprise Security

You will learn the different types of viruses: Boot sector, Program, Macro

You will also learn types other than viruses: Virus Hoaxes, Trojan Horses, Worms, Spam, Adware, Spyware

You will have clarity on what an Anti-Virus is, types of Anti-Virus products, how does Anti-virus work and examples of Anti-virus software's

Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices.

Email: SMTP, Email system, webmail architecture - IMAP4 based, Email based attacks - social engineering, proxy server

Cyber security incidence response: what is it?, examples, purpose of incident response, cyber security incidents, meantime to resolution, incident management process, Logs from security monitoring and logging tools, Detection, Prevention and Protection

Understand and Manage Vulnerabilities

 

A Guide to Security Information and Event Management - SIEM

Part 1

Part 2


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Solid   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss