Syllabus of Siem Certification Online Training
Module 1: Introduction to SIEM
Module 2: Network Threats
Module 3: SIEM Architecture
Module 4: SIEM Deployment
Module 5: Logs and Events
Module 6: Event Collection and Event Correlation
Module 7: Correlation Rules
Module 8: Forensically Ready Data
Module 9: Intrusion Detection, Prevention and Tolerance
Module 10: Properties of a Robust SIEM
Module 11: Installing Alien Vault SIEM
Module 12: Using Web Interface
Module 13: Configuring Sensor, Logger and Server
Module 14: Onfiguring Network Inventory
Module 15: Configuring Vulnerability Scanning
Module 16: Configuring Signature Updates
Module 17: Policy Management
Module 18: Configuring Tickets
Module 19: Introduction to SPLUNK
Module 20: Overview of machine data
Module 21: How Splunk works with machine data
Module 22: Introduction to Splunk's user interface
Module 23: Searching and saving results
Module 24: Creating reports and visualizations