SIEM Design And Implementation

SIEM Design And Implementation

Current Status
Not Enrolled
Get Started

SIEM Design And Implementation Course Summary

SIEM Design And Implementation course are designed to simplify SIEM process of implementing a solution that is usable, scalable, and simple to maintain. The core objective of this course is to empower students with the knowhow to build a SIEM from the ground up using the Elastic Stack and to understand the required stages of log collections.

We will cover endpoint agent selection, logging formats, parsing, enrichment, storage, and alerting, and we will combine these components to make a flexible, high-performance SIEM solution. This course covers the vital components of SIEM to empower SIEM engineers and analysts with a good understanding of the system and how to professionally make the best use of technology identify, assess, monitor activities on the network and escalate irresponsible and suspicious behaviours for the appropriate actions.

SIEM Design And Implementation Learning Outcome

At the end of this course students will be able to:

  • Attain the architectural skill to design a SIEM solution with focus on speed and efficiency
  • Able to configure vulnerability scanning, network inventory, tickets and signature updates
  • Able to deploy an open-source SIEM solution meant for enterprise workloads
  • Collect and efficiently analyse and monitor logs
  • Discover how and when to augment and scale log collection and its capabilities
  • To understand and parse intrusion, detection, and prevention systems
  • Build a compliance and tactical SIEM, whether a single system or dual stack (multiple SIEMs)
  • Able to timely deploy multiple SIEM solutions and how to integrate them
  • Know how to deploy an alert system and rules
  • Implement tiered storage with aging policies to handle data retention and disk speeds
  • Implement search and enhance logs to add context
  • Able to identify log sources and how to automate data collection
  • Identify and manage common SIEM deployment pitfalls and constraints

 Who Should Take this Course?

  • SIEM Platform Engineers
  • Security Engineers and Managers
  • SOC Analysts
  • Security Analysts
  • Technical Security Managers
  • SOC Engineers
  • SOC Managers
  • System Administrators
  • Cyber Threat Investigators

 Related Course?

Scroll to Top