This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
A Guide to Security Information and Event Management - SIEM
A Guide to Security Information and Event Management - SIEM
1.SIEM Promotion (0:31)
2.Introduction to SIEM (6:54)
3.Key Objectives of SIEM (1:55)
4.Defence in Depth (4:21)
5.Corporate environment (3:59)
8.Use Cases for SIEM (17:02)
6.Log Management (11:14)
7.Why is SIEM necessary (10:24)
9.Elements of SIEM (42:10)
10.SIEM Deployment Options (28:40)
11.Splunk (25:47)
12.Introduction to Splunk's user interface (95:47)
13.Splunk Using basic transforming commands (7:37)
14.Splunk Creating Reports and Dashboards (23:01)
15.Splunk Saving and sharing reports (4:22)
16.Splunk Dashboards (9:17)
17.Splunk Creating alerts (44:16)
Guide to Computer Network Security 3rd Edition [2015]
Hack the Stack
5.Corporate environment
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock