SIEM (Security Information & Event Management) | SIEM Methodologies | Splunk In-Depth | InfosecTrain
InfosecTrain offers Cyber Security Training & Certification. To know more about Cyber Security course and other training we conduct, please visit https://www.infosectrain.com/courses/ or write into us at sales@infosectrain.com or call us at +91-97736-67874
#siem #OSSIMfundamentals #CyberSecurity
0:00 Introduction
0:23 SIEM Methodologies
43:02 How SIEM works
1:03:16 Understanding Splunk
2:41:38 How log file is generated in network
2:45:35 Alienvault OSSIM
3:20:50 Incident response , mitre and attack
Day 1: SIEM Methodologies - https://www.youtube.com/watch?v=2ojAj7VCn24
Day 2: Web Application Testing - https://www.youtube.com/watch?v=ZstyFyfS3g4
Day 3: Network Assessment & Pen Testing - https://www.youtube.com/watch?v=lP0KyEh1jZ0
Agenda of the Session
• SIEM Methodologies
Garner’s magic quadrant, SIEM guidelines and architecture, baselining with correlation of logs and events will be discussed.
• Splunk In-Depth
Industrial requirements of Splunk in various fields, Splunk terminologies, search processing language and various industry use cases.
• AlienVault OSSIM fundamentals
AlienVault fundamentals and architecture deployment. Vulnerability scanning & monitoring with OSSIM.
• Incident response
Mitre and ATT&CK for better understanding and defending.
Видео SIEM (Security Information & Event Management) | SIEM Methodologies | Splunk In-Depth | InfosecTrain канала INFOSEC TRAIN
#siem #OSSIMfundamentals #CyberSecurity
0:00 Introduction
0:23 SIEM Methodologies
43:02 How SIEM works
1:03:16 Understanding Splunk
2:41:38 How log file is generated in network
2:45:35 Alienvault OSSIM
3:20:50 Incident response , mitre and attack
Day 1: SIEM Methodologies - https://www.youtube.com/watch?v=2ojAj7VCn24
Day 2: Web Application Testing - https://www.youtube.com/watch?v=ZstyFyfS3g4
Day 3: Network Assessment & Pen Testing - https://www.youtube.com/watch?v=lP0KyEh1jZ0
Agenda of the Session
• SIEM Methodologies
Garner’s magic quadrant, SIEM guidelines and architecture, baselining with correlation of logs and events will be discussed.
• Splunk In-Depth
Industrial requirements of Splunk in various fields, Splunk terminologies, search processing language and various industry use cases.
• AlienVault OSSIM fundamentals
AlienVault fundamentals and architecture deployment. Vulnerability scanning & monitoring with OSSIM.
• Incident response
Mitre and ATT&CK for better understanding and defending.
Видео SIEM (Security Information & Event Management) | SIEM Methodologies | Splunk In-Depth | InfosecTrain канала INFOSEC TRAIN
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![What is a SIEM solution? How SIEM works and Architecture?](https://i.ytimg.com/vi/V5XN2hd3BHM/default.jpg)
![](https://i.ytimg.com/vi/-IBDLo2zO34/default.jpg)
![SOC 101: Real-time Incident Response Walkthrough](https://i.ytimg.com/vi/2BOOl8_nwjQ/default.jpg)
![Splunk Training | Introduction to Splunk | Intellipaat](https://i.ytimg.com/vi/bpP2tZPoK8M/default.jpg)
![Career Scope in Cyber Security | SIEM | Arcsight | Splunk | Qradar | SOC Analyst by Sulabh Mishra](https://i.ytimg.com/vi/5uiXY3VOEBo/default.jpg)
![Network Assessment & Pen Testing | What is VAPT ? | Vulnerability Assessment | Infosectrain](https://i.ytimg.com/vi/2ojAj7VCn24/default.jpg)
![Best SIEM Products: SIEM Explained And Top 5 Tools](https://i.ytimg.com/vi/3JVJy35VdW4/default.jpg)
![What is SIEM & It's Requirement in Corporate Networks | By Sulabh Mishra | SIEM XPERT](https://i.ytimg.com/vi/GxHHVnDb6w0/default.jpg)
![What is SIEM? Security Information & Event Management Explained](https://i.ytimg.com/vi/GbFtSDnPZBQ/default.jpg)
![Web Application Testing | OWASP Top 10 | Cyber Security Training | InfosecTrain](https://i.ytimg.com/vi/ZstyFyfS3g4/default.jpg)
![Computer Networking Complete Course - Beginner to Advanced](https://i.ytimg.com/vi/QKfk7YFILws/default.jpg)
![SOC 2 vs ISO 27001](https://i.ytimg.com/vi/vPmbzEKAHmM/default.jpg)
![What is a SOC - Security Operations Center.](https://i.ytimg.com/vi/dBAXwA979hM/default.jpg)
![SOC Analyst (Cybersecurity) Interview Questions and Answers - SOC Processes](https://i.ytimg.com/vi/0POWOu4iUrg/default.jpg)
![Splunk Security Investigations, Part 1: Threat Detection](https://i.ytimg.com/vi/7DRHt8LJN_g/default.jpg)
![Cyber Security Full Course - Learn Cyber Security In 8 Hours | Cyber Security Training |Simplilearn](https://i.ytimg.com/vi/PlHnamdwGmw/default.jpg)
![IBM QRadar SIEM | Investigating an Offense Triggered by Event | IBM QRadar SIEM Offense Basics](https://i.ytimg.com/vi/QgvbBkhtit4/default.jpg)
![Splunk Enterprise Security Training | Splunk Security Training | Intelllipaat](https://i.ytimg.com/vi/9D00ysP5Hbg/default.jpg)
![A Day in the Life of an Analyst | LogRhythm Demo](https://i.ytimg.com/vi/9TRqZuZqtKY/default.jpg)
![Splunk interview Question and answers - Part#1](https://i.ytimg.com/vi/WKQz1wQaBJY/default.jpg)