• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE LOCATION ACTION
For more details, please call us on +1800-961-0337 or email us on info@microteklearning.com

Security Analytics 7.2.X Professional

Course Overview

The Symantec Security Analytics Professional course is intended for members who need to figure out how to utilize the Symantec Security Analytics stage to perform for all intents and purposes any kind of system based observing and scientific examination, including episode reaction examination, ongoing situational mindfulness, and consistent checking for pointers of trade off (IOCs) and progressed constant dangers (APTs).

Endless supply of this course, understudies will learn:

  • Guide abnormal state operational capacities to interior framework modules and distinguish how information courses through the framework
  • Utilize reports and extractions to discover and investigate important information to tackle issues
  • Utilize examinations and propelled show channels to limit indexed lists
  • Import/trade PCAPs for legal investigation and documented capacities
  • Utilize activities, alarms, and ongoing extractor
  • Utilize the Security Analytics stage for occurrence reaction
  • Apply slaughter fasten examination to find and depict markers of bargain
  • Explore and inquiry the virtual document framework

Extension and Target Audience

Extension:

Course level: Introductory

Course length: 2 Days

Course arrange: Virtual Classroom Training

Stage bolstered: Symantec Security Platform

Target Audience:

  • IT or system security experts who need to ace the utilization of Blue Coat Security Analytics and who have finished the Symantec Security Analytics Administrator course.

Security Analytics 7.2.X Professional

Course Outline

This class covers the accompanying points:

  • How Security Analysis Works
  • Document and Artifact Extraction
  • Abnormality Detection and Modeling
  • Information Enrichment
  • Danger Intelligence Services
  • Murder Chain Analysis
  • Markers of Compromise (IOCs)
  • Malware Integration
  • The Virtual Filesystem (VFS)

Prerequisites

  • Members ought to have a sound comprehension of the OSI reference model and basic systems administration conventions, and how those conventions influence associations, to keep state, and exchange information, alongside essential involvement with organize bundle and stream investigation, including the utilization of PCAP records, tcpdump, and Wireshark.
  • Essential to cutting edge information of best practices for occurrence reaction and ceaseless checking will give a noteworthy preferred standpoint.