Description
Price: 5.00 USD | Size: 3.21 GB | Duration : 3.29 Hours | 15 Video Lessons |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9
Actionable Information from Aggregated Log Data
A centralized logging system is only one part of a complete logging infrastructure. In order to properly protect an IT infrastructure from malicious actors, useful information needs to be extracted from that log data. Throughout this course, we will examine various logging formats and sources, and how proper aggregation and correlation strategies can help pull that actionable intelligence that is required for proper countermeasure construction. In addition, we’ll look at various tools that can be used throughout the process and the importance of continuous monitoring of not only logs and alerts, but also countermeasure effectiveness.
Course Introduction
Data Collection
Logging
Activities:12
Logging Summary
Logging Summary
Log Sources & Types
Log Sources & Types
Log Formats
Log Formats
Collection & Aggregation
Collection & Aggregation
Collection/Aggregation Demo
Log Collection & Aggregation
Log Normalization
Log Normalization
Countermeasures
Analysis
Activities:8
Log Analysis
Log Analysis
Log Analysis Demo
Log Analysis
Countermeasures
Countermeasures
Continuous Monitoring & Alerting
Continuous Monitoring & Alerting
Tools
Activities:6
YARA Introduction
YARA Introduction
Building YARA Rules
Building YARA Rules
YARA Demo
Building YARA Rules
Goodbye
Conclusion
Activities:1
Course Conclusion
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.