Objectives


After completing this course, you should be able to perform the following tasks:

  • Use tools on the Admin tab to manage administrative functions
  • Build a network hierarchy
  • Manage assets, reference sets, and the index
  • Configure user accounts and authentication
  • Use backups, recovery, and retention buckets to manage data
  • Manage log and flow data sources
  • Create customized log sources
  • Use and create rules
  • Identify and tune false positives

Key Topics

  • Security

Audience

This course is for:

  • security analysts
  • security technical architects
  • offense managers
  • network administrators
  • system administrators

 

Prerequisites


You should have the following skills:

  • IT infrastructure
  • IT security fundamentals
  • Linux
  • Windows
  • TCP/IP networking
  • Syslog

Duration

Three days