Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security QRadar

SIEM Admin - Incident Handing Training - SOC Team

Learn about SIEM tools HP Arcsight, IBM QRadar, RSA Security Analytic, Splunk, McAfee Nitro required for in SOC
Rating: 3.5 out of 53.5 (27 ratings)
92 students
Created by Vikram Saini
Last updated 12/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • What is the SIEM
  • SIEM Business Requirement
  • Integration Configuration of Data sources [Splunk]
  • SIEM Architechture of HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro
  • Administration of Configuration of Multiple SIEM (HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro)
  • Roles of Different SIEM Component of HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro
  • Event Life Cycle in SIEM Solution HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro
  • Alert Creation in [Splunk]
  • Creating Dashboards for Attack Analysis [Splunk]
  • Report Configuration [Splunk]
  • Building Industry Based Use Cases [Splunk]
  • Event Monitoring [Splunk]
  • Fine Tuning Of Alerts [Splunk]
  • Real World Incident Response Investigation [Splunk]
  • What is Cyber Kill Chain
  • How to develop effective USECASE in SIEM
  • How to Evaluate a SIEM tool

Requirements

  • SOC Analyst Training [By Vikram Saini]
  • Be able to understand the basic of windows and networks

Description

THE MOST DEMANDING SIEM Online Training IS NOW ON UDEMY!

PHASE 2 - This course will make you familiar and teach you about various SIEM tools component, architecture, event life cycle and administration part for Splunk for log source integration, rule creation,  report configuration, dashboard creation, fine tuning and Incident Handing steps followed by Security Operation Center Team.

This course is designed is such a way, that any beginner or any working professional can learn the below SIEM tools event flow, architecture, design & difference.

1) HP ArcSight

2) IBM QRadar

3) RSA Security Analytics

4) Splunk

5) McAfee Nitro


What you will learn after completing this course:

  • What is the SIEM

  • SIEM Business Requirement

  • SIEM Architecture of HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro

  • Event Life Cycle in SIEM Solution HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro

  • Roles of Different SIEM Component of HP Arcsight, IBM QRadar, Splunk, RSA SA & McAfee Nitro

  • Integration Configuration of Data sources [Splunk]

  • What is Cyber Kill Chain

  • How to develop effective USECASE in SIEM

  • How to Evaluate a SIEM tool

  • Building Industry Based Use Cases [Splunk]

  • Alert Creation in [Splunk]

  • Event Monitoring [Splunk]

  • Creating Dashboards for Attack Analysis [Splunk]

  • Report Configuration [Splunk]

  • Fine Tuning Of Alerts[Splunk]

  • Real World Incident Response Investigation [Splunk]


Happy Learning !

Who this course is for:

  • College Student looking for Cyber Security Opportunity.
  • Security Engineer curious about SIEM
  • SOC Analyst looking for SIEM Administration Training
  • Network Engineer looking for change in Cyber Security
  • Sr. SOC Analyst looking for learn multiple SIEM tools

Course content

11 sections • 50 lectures • 3h 36m total length

  • Preview09:42

  • Preview08:02

  • SIEM Architecture - Receiver Component.
    03:42
  • SIEM Architecture - Manager Component
    02:58
  • SIEM Architecture - Logger Component
    04:33

  • HP Arcsight Architecture
    02:09
  • RSA SA Architecture
    01:37
  • IBM Architecture
    00:26
  • Splunk Architecutre
    00:39
  • Mcafee Architecture
    00:48

  • Why Integration is required
    06:53

  • Types of SIEM Installation
    02:45
  • SIEM Installation
    03:56
  • SIEM Features
    03:56

  • Installation of Agent in Windows Machine
    03:05
  • Integration & Configuration of Agent in Windows Machine
    04:42
  • Installation of Agent in Linux Machine
    02:43
  • Integration & Configuration of Agent in Linux Machine
    02:52
  • Configuration of Sys-logging in SIEM
    03:12
  • Integration of Network Device
    01:34

  • What is Usecase
    02:52
  • Development Life-cycle for USECASES
    00:45
  • Phase 1 - Requirement for Usecase
    00:49
  • Phase 2 - Data Points for Usecase
    01:25
  • Phase 3 - Log validation for Usecase
    01:29
  • Phase 4 - Design & Phase 5 -Implementation for Usecase
    02:52
  • Phase 6 - Documentation for Usecase
    01:04
  • Phase 7 - Onboarding for Usecase
    00:58
  • Phase 8 - Periodical Updation for Usecase
    01:04
  • Types of Usecases
    01:40
  • Cyber Kill Chain
    00:56
  • Reconnaissance & Weaponization
    01:11
  • Delivery, Exploitation & Installation
    01:29
  • Command and Control & Actions on Objective
    00:46
  • How to Build Effective Usecase - Requirement & Risk
    02:30
  • Build Effective Usecase - Define Alert
    03:26
  • Build Effective Usecase - Priority, Impact & Mapping to Kill Chain
    01:43
  • Build Effective Usecase - Measure Response & Detection
    01:44
  • Build Effective Usecase - Standard Operating Procedures & Tuning Requirement
    01:42
  • Build Effective Usecase - Response Plan and Operational Agreement
    02:09
  • build Effective Usecase - Auditing & Reviewing
    02:36
  • Evaluate SIEM capabilities with the Usecases.
    01:56
  • Failed Authentication - Building Real-World Usecase
    06:41
  • Lecture 44: Malware Identification - Building Real-World Usecase
    08:08
  • Building Industry Based Use Cases [Splunk] - Splunk Fundamentals
    07:56
  • Building Industry Based Use Cases [Splunk] - Splunk Searches
    18:56

  • Building Industry Based Use Case [Splunk] - Part 1
    09:12
  • Building Industry Based Use Case [Splunk] - Part 2
    19:47

  • Event Monitoring, Dashboard Creation & Fine-Tuning
    17:34

Instructor

Vikram Saini
Cyber Security Expert | Threat Hunting | Incident Response
Vikram Saini
  • 3.5 Instructor Rating
  • 246 Reviews
  • 677 Students
  • 4 Courses

Vikram Saini worked for well-known companies like Dell, Hilton, Moody's and more in MSS SOC. He always likes to help others, to learn and to grow. He is glad to share his knowledge and experience on Udemy which will help others to grow in Cyber Security.

This training is intended for the Freshers & Experience Guys.  Who is looking for carrier opportunities in cyber security and for Experienced Guys, this training will enhance the knowledge and skills required to work in Security Operation Center.

This is the first SOC Operation Center training which is provided to become a SOC analyst with a real-world cyber attack with samples of network packet capture. 


  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.