Objectives
After completing this course, you should be able to perform the following tasks:
- Use tools on the Admin tab to manage administrative functions
- Build a network hierarchy
- Manage assets, reference sets, and the index
- Configure user accounts and authentication
- Use backups, recovery, and retention buckets to manage data
- Manage log and flow data sources
- Create customized log sources
- Use and create rules
- Identify and tune false positives
Key Topics
- Security
Audience
This course is for:
- security analysts
- security technical architects
- offense managers
- network administrators
- system administrators
Prerequisites
You should have the following skills:
- IT infrastructure
- IT security fundamentals
- Linux
- Windows
- TCP/IP networking
- Syslog
Duration
Three days