YoVDO

Getting Started in Security Analytics with CyberEASY

Offered By: Cybrary

Tags

Security Information and Event Management (SIEM) Courses Risk Mitigation Courses Threat Hunting Courses

Course Description

Overview

This course focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The course will show the role of CyberEASY on threat intelligence and threat hunting and how CyberEASY can help the organization to better understand their cyber risks environment.

Prerequisites

This would be an appropriate course for a skilled online learner who has had some type of experience in the Cybersecurity field. They should understand at least the basics of cybersecurity, and how networks are protected nowadays.

Course Goals

By the end of this course, students should be able to:

❏ A. Understand the limitations of the current tools used in cybersecurity.

❏ B. Knowledge of the importance of cybersecurity analytics in a hostile environment.

❏ C. How to use CyberEASY to identify and mitigate cyber risk.


Syllabus

  • Module 1: Understanding SIEM’s Role in Security
    • 1.1 Introduction
    • 1.2 The Principal Functions, Limitations and Challenges of a SIEM Solution
  • Module 2: Inside the Security Analytics Process
    • 2.1 The Security Analytics Process
    • 2.2 The Concept of Threat Hunting
  • Module 3: Identify and mitigate Cyber Risk with CyberEASY
    • 3.1 CyberEASY Installation and Dashboard Overview
    • 3.2 Correlation of Events and Threat Hunting in CyberEASY

Taught by

Ken Gilmour

Related Courses

The Location Advantage
Esri via Independent
Secure Android App Development
University of Southampton via FutureLearn
Cloud Computing Security
University System of Maryland via edX
Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
المدافعون عن حقوق الإنسان
Amnesty International via edX