HOME > IT & Software > A Guide to Security Information and Event Management SIEM

A Guide to Security Information and Event Management SIEM

SynopsisA Guide to Security Information and Event Management –...
A Guide to Security Information and Event Management SIEM  No.1

A Guide to Security Information and Event Management – SIEM, available at $79.99, has an average rating of 3.71, with 53 lectures, 1 quizzes, based on 435 reviews, and has 11042 subscribers.

You will learn about In this course you will go through an Introduction to SIEM, its Key Objectives, Defence in Depth, Corporate environment, Log Management You will get an introduction to Splunks user interface and will be conversant with the UI post this session. Start using Splunks basic transforming commands and create reports, dashboards and alerts. You will start using Splunk Enterprise Security You will learn the different types of viruses: Boot sector, Program, Macro You will also learn types other than viruses: Virus Hoaxes, Trojan Horses, Worms, Spam, Adware, Spyware You will have clarity on what an Anti-Virus is, types of Anti-Virus products, how does Anti-virus work and examples of Anti-virus softwares Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices. Email: SMTP, Email system, webmail architecture – IMAP4 based, Email based attacks – social engineering, proxy server Cyber security incidence response: what is it?, examples, purpose of incident response, cyber security incidents, meantime to resolution etc Understand and Manage Vulnerabilities Gain Insights from a case study of how to prepare for an Interview for SOC Roles Learn hints & tips of cracking interviews This course is ideal for individuals who are SOC Analysts, Cyber Security Enthusiasts, IT Security Specialists and those who are looking for a career in SOC – Security Operations Center or Beginners It is particularly useful for SOC Analysts, Cyber Security Enthusiasts, IT Security Specialists and those who are looking for a career in SOC – Security Operations Center or Beginners.

Enroll now: A Guide to Security Information and Event Management – SIEM

Summary

Title: A Guide to Security Information and Event Management – SIEM

Price: $79.99

Average Rating: 3.71

Number of Lectures: 53

Number of Quizzes: 1

Number of Published Lectures: 53

Number of Published Quizzes: 1

Number of Curriculum Items: 57

Number of Published Curriculum Objects: 57

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • In this course you will go through an Introduction to SIEM, its Key Objectives, Defence in Depth, Corporate environment, Log Management
  • You will get an introduction to Splunks user interface and will be conversant with the UI post this session.
  • Start using Splunks basic transforming commands and create reports, dashboards and alerts.
  • You will start using Splunk Enterprise Security
  • You will learn the different types of viruses: Boot sector, Program, Macro
  • You will also learn types other than viruses: Virus Hoaxes, Trojan Horses, Worms, Spam, Adware, Spyware
  • You will have clarity on what an Anti-Virus is, types of Anti-Virus products, how does Anti-virus work and examples of Anti-virus softwares
  • Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices.
  • Email: SMTP, Email system, webmail architecture – IMAP4 based, Email based attacks – social engineering, proxy server
  • Cyber security incidence response: what is it?, examples, purpose of incident response, cyber security incidents, meantime to resolution etc
  • Understand and Manage Vulnerabilities
  • Gain Insights from a case study of how to prepare for an Interview for SOC Roles
  • Learn hints & tips of cracking interviews
  • Who Should Attend

  • SOC Analysts, Cyber Security Enthusiasts, IT Security Specialists and those who are looking for a career in SOC – Security Operations Center
  • Beginners
  • Target Audiences

  • SOC Analysts, Cyber Security Enthusiasts, IT Security Specialists and those who are looking for a career in SOC – Security Operations Center
  • Beginners
  • In this course you will go through an Introduction to SIEM, its Key objectives, Defence in depth, Corporate environment, Log management, Why siem is necessary, Use cases, Elements of siem, Big 3 for siem, SIEM process flow, Typical features of siem, Event life cycle, Soc controls and Management, SIEM Architecture, 8 critical features of SIEM and SIEM Deployment options. You will also get an introduction to Splunk’s user interface and will be conversant with the UI. You can start using the Splunk’s basic transforming commands, can create reports and dashboards, you will know how to save and share reports and also can create alerts.

    Section 1

    You will gain real time insights on Security information and event management and Security event manager

    Section 2

    You will identify threats and possible breaches and collect audit logs for security and compliance. You will be able to conduct investigations and provide evidence.

    Section 3

    You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information.

    Section 4

    You can understand how an attacker can come in and tries to understand how a corporate environment is setup of a target.

    Section 5

    You will learn what SIEM and Log Management mean for businesses & how to use them more effectively to mitigate risk for your company.

    Section 6

    You will learn that SIEM is necessary because of the rise in data breaches and to meet stringent compliance requirements

    Section 7

    Learn the right approach to building SIEM use cases, how to organize and prioritize use cases effectively.

    Section 8

    You will learn the SIEM elements, Big 3, Process flow, Features, Event life cycle, SOC controls and mgmt, SIEM architecture, Dashboards and Use cases

    Section 9

    You will revisit features of SIEM and learn SIEM deployment options like self-hosted, self-managed to Hybrid-model, Jointly-managed. You will understand the business benefits of SIEM.

    Section 10

    SIEM Essentials Quiz

    Section 11

    Security Operations Center – SOC with Splunk & FortiSIEM

    Section 12

    Network Concepts Refresher, OSI, TCPIP Protocol Suite

    Section 13

    Cyber Security Attacks, Ethical Hacking, DoS, DDoS, SYN Flooding, Metasploit

    Section 14

    Maltego, Cyber Killchain methodology, Information security vectors, Ransomware

    Section 15

    You will understand Splunk’s user interface -UI. You will be able to navigate UI features on your own: Navigating splunk web: splunk home, splunk bar, splunk web,getting date into splunk, how to specify data inputs, where splunk stores data, getting tutorial data into splunk, using splunk search, search actions and modes, search results tools, events, what are fields, extracted fields, find and select fields,run more targeted searches, use the search language, learn with search assistant

    Section 16-21

    You can start using the Splunk’s basic transforming commands, can create reports and dashboards, you will know how to save and share reports and also can create alerts after completing these sections.

    Section 22

    You will go through a live case study on how Fortinet’s FortiSIEM works right from the foundation.

    Section 23-27

    Learn the types of viruses, security devices, incidence response, IMAP4 based Email & vulnerability management

    Section 28

    Interview Preparation for Cyber Security Roles & SOC Roles!

  • Gain Insights from this Live Case study of how to prepare for an Interview for a SOC Role. You will find the Subject matter expert guiding the Interviewee to crack an Interview.

  • Understanding the Cyber Security Role using a sample Job Description

  • Risk Based Approach Insights

  • Interview Questions, NIST 863-53 & NIST 800-171

  • A Guide to Malware Incident Prevention and Handling

  • Practical Interview Technical Hints & Tips

  • Testimonials:

    Good content delivered by very knowledgeable individual  Sifiso

    Excellent course for the professionals who want to enter/know SIEM or to improve their existing skill set.. Lecturer is a real time professional who has in-depth knowledge of what he is teaching and making sure that it reaches to listeners Also for the guys who want to learn Splunk  Ram

    This course lays the foundation for SIEM, the instructor is a working professional and gave real time examples which made it easier to understand. Expecting more sections to be added, Highly recommend to Beginners!  Souha Djim

    It has in-depth knowledge of Splunk and is very insightful  Megha Sahai

    One of the Best Mehedi Hasan

    Yes.I got a very good understanding of SIEM and way to go further. Thanks Udemy for this wonderful course. WIll subscribe to new courses in future as and when my need increases.  Chandrasekaran Lakshmanan

    It is a very good one because I am in the cyber Security field. I would recommend it to my friends. Jeffery Osuya

    This is very very important Tutorial series for those who are seeking to increase their skillset and knowledge. This very valuable for me and my carrier. Thank you.  Yes, Its a perfect match according to my career, as i want to become the SOC analyst. It is a right course for me. Syed Ali Hassnain

    It is a great learning session & useful for learners & professionals , thank u for given wonderful opportunity to learn

    Madupalli Satheesh

    Going good. Excited to go thorough the remaining course. Sumanta Banerjee

    Course Curriculum

    Chapter 1: Introduction to SIEM

    Lecture 1: Introduction

    Chapter 2: Key Objectives of SIEM

    Lecture 1: Key Objectives of SIEM

    Chapter 3: Defence in Depth

    Lecture 1: Defence in Depth

    Chapter 4: Corporate environment

    Lecture 1: Corporate environment

    Chapter 5: Log Management

    Lecture 1: Log management

    Chapter 6: Why is SIEM necessary?

    Lecture 1: Why is SIEM necessary?

    Chapter 7: Use Cases for SIEM

    Lecture 1: Use Cases for SIEM

    Chapter 8: Elements of SIEM

    Lecture 1: SIEM Elements

    Chapter 9: SIEM Deployment Options

    Lecture 1: SIEM Deployment Options

    Chapter 10: Quiz Time

    Chapter 11: Security Operations Center – SOC with Splunk & FortiSIEM

    Lecture 1: SOC Curriculum

    Lecture 2: Security Triad: Confidentiality, Integrity & Availability

    Lecture 3: Computer Network, Topologies

    Lecture 4: Network Footprinting

    Chapter 12: Network Concepts Refresher, OSI, TCPIP Protocol Suite

    Lecture 1: Network Concepts

    Lecture 2: OSI Continued

    Lecture 3: OSI Last Part

    Lecture 4: TCP/IP Protocol Suite

    Chapter 13: Cyber Security Attacks, Ethical Hacking, DoS, DDoS, SYN Flooding, Metasploit

    Lecture 1: Cybersecurity Attacks

    Lecture 2: Ethical Hacking

    Lecture 3: DoS DDoS

    Lecture 4: SYN Flooding using Hping3

    Lecture 5: Counter Measures

    Lecture 6: Metasploit Test

    Chapter 14: Maltego, Cyber Killchain methodology, Information security vectors, Ransomware

    Lecture 1: Maltego

    Lecture 2: Cyber kill chain methodology

    Lecture 3: Information security vectors

    Lecture 4: Ransomware

    Lecture 5: Web Application Security

    Chapter 15: Introduction to Splunks UI – User Interface

    Lecture 1: Splunk Introduction

    Lecture 2: Introduction to Splunks user interface

    Chapter 16: Splunk: Using basic transforming commands

    Lecture 1: Basic transforming commands

    Chapter 17: Splunk: Creating Reports and Dashboards

    Lecture 1: Creating Reports and Dashboards

    Chapter 18: Splunk: Saving and sharing reports

    Lecture 1: Splunk: Saving and sharing reports

    Chapter 19: Splunk: Dashboards

    Lecture 1: Dashboards

    Chapter 20: Splunk: Creating alerts

    Lecture 1: Creating Alerts

    Chapter 21: Splunk Enterprise Security

    Lecture 1: Splunk ES – Part 1

    Lecture 2: Splunk ES – Part 2

    Lecture 3: Splunk ES – Part 3

    Lecture 4: Splunk ES – Part 4

    Chapter 22: FortiSIEM: A Case Study on a powerful SIEM

    Lecture 1: FortiSIEM Foundation

    Lecture 2: FortiSIEM Part2

    Lecture 3: FortiSIEM Part3

    Lecture 4: FortiSIEM Part4

    Chapter 23: Types of Viruses

    Lecture 1: Viruses

    Chapter 24: Security Devices

    Lecture 1: Learn more on Security Devices

    Chapter 25: Email: SMTP, Email system, webmail architecture – IMAP4 based

    Lecture 1: Email based attacks – social engineering, proxy server

    Chapter 26: Cyber security incidence response

    Lecture 1: Purpose of incident response, cyber security incidents, meantime to resolution

    Chapter 27: Vulnerability Management

    Lecture 1: Vulnerability Management

    Chapter 28: Interview Preparation for Cyber Security Roles & SOC Roles!

    Lecture 1: Understanding the Cyber Security Role using a sample Job Description

    Lecture 2: Risk Based Approach Insights

    Lecture 3: Interview Questions, NIST 863-53 & NIST 800-171

    Lecture 4: A Guide to Malware Incident Prevention and Handling

    Lecture 5: Practical Interview Technical Hints & Tips

    Instructors

  • A Guide to Security Information and Event Management SIEM  No.2
    Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
    Cybersecurity, Data Science & Human Capital Practitioners!
  • Rating Distribution

  • 1 stars: 27 votes
  • 2 stars: 27 votes
  • 3 stars: 82 votes
  • 4 stars: 132 votes
  • 5 stars: 167 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!