SEC555: SIEM with Tactical Analytics - March 11-16, 2019 - Virginia Tech Campus - Blacksburg, VA
SEC555: SIEM with Tactical Analytics - March 11-16, 2019 - Virginia Tech Campus - Blacksburg, VA



GENERAL INFORMATION

SEC555: SIEM with Tactical Analytics - March 11-16, 2019
Location: TBD
Virginia Tech Campus, Blacksburg, Virginia

Many organizations have logging capabilities but lack the people and processes to analyze it. In addition, logging systems collect vast amounts of data from a variety of data sources which require an understanding of the sources for proper analysis. This class is designed to provide individuals training, methods, and processes for enhancing existing logging solutions. This class will also provide the understanding of the when, what, and why behind the logs. This is a lab heavy course that utilizes SOF-ELK, a SANS sponsored free SIEM solution, to train hands on experience and provide the mindset for large scale data analysis.

Today, security operations do not suffer from a "Big Data" problem but rather a "Data Analysis" problem. Let's face it, there are multiple ways to store and process large amounts of data without any real emphasis on gaining insight into the information collected. Added to that is the daunting idea of an infinite list of systems from which one could collect logs. It is easy to get lost in the perils of data saturation. This class is the switch from the typical churn and burn log systems, to achieving actionable intelligence and developing a tactical Security Operations Center (SOC).

This course is designed to demystify the Security Information and Event Management (SIEM) architecture and process, by navigating the student through the steps of tailoring and deploying a SIEM to full Security Operations Center (SOC) integration. The material will cover many bases in the "appropriate" use of a SIEM platform to enrich readily available log data in enterprise environments and extract actionable intelligence. Once collected, the student will be shown how to present the gathered input into useable formats to aid in eventual correlation. Students will then iterate through the log data and events to analyze key components that will allow them to learn how rich this information is, how to correlate the data, start investigating based on the aggregate data, and finally, how to go hunting with this newly gained knowledge. They will also learn how to deploy internal post-exploitation tripwires and breach canaries to nimbly detect sophisticated intrusions. Throughout the course, the text and labs will not only show how to manually perform these actions, but how to automate many of the processes mentioned so students may employ these tasks the day they return to the office.

The underlying theme is to actively apply Continuous Monitoring and analysis techniques by utilizing modern cyber threat attacks. Labs will involve replaying captured attack data to provide real world results and visualizations

This Course Will Prepare You To:

Day 1: SIEM Architecture and SOF-ELK
Day 2: Service Profiling with SIEM
Day 3: Advanced Endpoint Analytics
Day 4: Baselining and User Behavior Monitoring
Day 5: Tactical SIEM Detection and Post-Mortem Analysis
Day 6: Capstone: Design, Detect, Defend

For more in-depth course descriptions, visit www.sans.org/private-training/course/siem-with-tactical-analytics.

For More Information Contact:

Amy Kobezak, (540) 231-5982
Email: akobezak@vt.edu


Share this site.


 

Virginia Tech - Invent the Future  Continuing & Professional Education @ Virginia Tech  
Virginia Tech's Equal Opportunity/Affirmative Action Statement: www.vt.edu/about/equal-opportunity.html