Course Title: Latest technologies in Identity and Access Management (IAM)
Course Category: IT and Data Subcategory: IT Security
Course Location: Course Date: 31 December 2024
€4710

One week


Latest technologies in Identity and Access Management (IAM)

Security Information and Event Management (SIEM) is a critical component of an organization's cybersecurity defense system. The course is designed to provide IT Security Administration Specialists with the knowledge and skills required to effectively manage SIEM systems. It covers the fundamental concepts of SIEM, including threat detection, log management, correlation and analysis, reporting, and response.

Outputs:

Upon completion of this course, participants will have:
An understanding of the concepts and architecture of SIEM systems
Knowledge of threat detection and log management in SIEM systems
Knowledge of correlation and analysis in SIEM systems
Ability to generate reports and perform incident response with SIEM systems
Knowledge of the challenges and best practices in implementing and managing SIEM systems

Objectives:

The objectives of this course are to:
Provide an understanding of the concepts and architecture of SIEM systems
Familiarize participants with the process of threat detection and log management in SIEM systems
Provide hands-on experience with correlation and analysis in SIEM systems
Teach participants how to generate reports and perform incident response with SIEM systems
Discuss the challenges and best practices in implementing and managing SIEM systems

Who Should Attend this Course:

This course is designed for IT Security Administration Specialists with prior experience in information security and/or IT administration. Participants should have a basic understanding of network security concepts and experience with security technologies.

Outline:

Day 1: Introduction to SIEM Concepts and Architecture

- Overview of SIEM systems
- SIEM architecture and components
- Threat intelligence and threat detection
- Overview of log management in SIEM systems

Day 2: Threat Detection and Log Management in SIEM Systems

- Configuring and collecting logs in SIEM systems
- Implementing threat detection rules and correlation
- Overview of log analysis and reporting in SIEM systems

Day 3: Correlation and Analysis in SIEM Systems

- Correlation and analysis in SIEM systems
- Hands-on practice with correlation and analysis
- Overview of incident response in SIEM systems

Day 4: Reporting and Incident Response in SIEM Systems

- Configuring and generating reports in SIEM systems
- Hands-on practice with incident response in SIEM systems
- Overview of best practices and challenges in implementing and managing SIEM systems

Day 5: Best Practices and Challenges in Implementing and Managing SIEM Systems

- Best practices in implementing and managing SIEM systems
- Common challenges in implementing and managing SIEM systems
- Case studies and real-world examples of SIEM implementation and management
- Wrap-up and review of the course content.

Throughout the course, participants will have the opportunity to work on practical exercises and case studies to apply the concepts and skills they have learned. The course will also include interactive discussions and opportunities for participants to share their experiences and insights.

Related Courses