Description
Price: 5.00 USD | Size: 3.20 GB | Duration : 3.42+ Hours
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
Actionable Information from Aggregated Log Data
A centralized logging system is only one part of a complete logging infrastructure. In order to properly protect an IT infrastructure from malicious actors, useful information needs to be extracted from that log data. Throughout this course, we will examine various logging formats and sources, and how proper aggregation and correlation strategies can help pull that actionable intelligence that is required for proper countermeasure construction. In addition, we’ll look at various tools that can be used throughout the process and the importance of continuous monitoring of not only logs and alerts, but also countermeasure effectiveness.
Content
01. Course Introduction
02. Logging Summary
03. Log Sources & Types
04. Log Formats
05. Collection & Aggregation
06. CollectionAggregation Demo
07. Log Normalization
08. Log Analysis
08. Log Analysis.ts
09. Log Analysis Demo
10. Countermeasures
11. Continuous Monitoring & Alerting
12. YARA Introduction
13. Building YARA Rules
14. YARA Demo
15. Course Conclusion
02. Logging Summary
03. Log Sources & Types
04. Log Formats
05. Collection & Aggregation
06. CollectionAggregation Demo
07. Log Normalization
08. Log Analysis
08. Log Analysis.ts
09. Log Analysis Demo
10. Countermeasures
11. Continuous Monitoring & Alerting
12. YARA Introduction
13. Building YARA Rules
14. YARA Demo
15. Course Conclusion
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.