Security Analytics for Analysts Training Logo

Security Analytics for Analysts Training

Live Online & Classroom Enterprise Training

Powered By

RSA Logo

Security Analytics for Analysts Training guides the analyst through the process, providing hands-on practice with analysis techniques, such as deploying external sources, creating custom feeds, creating rules to filter data, and reporting and alerting.

ATP_Authorized Logo

Powered By

RSA Logo

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Certified Trainer

  • Authorized Courseware

  • Completion Certificate from ATP

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Security Analytics for Analysts Training about?

This course provides a roadmap for using RSA Security Analytics for intelligence-driven analysis. The course guides the analyst through the process providing hands-on practice with analysis techniques such as deploying external sources creating custom feeds creating rules to filter data and reporting and alerting. Malware analysis and parsers are also covered as well as methodologies and best practices for optimal results. The course provides practice with packets and logs.

What are the objectives of Security Analytics for Analysts Training ?

At the end of Security Analytics for Analysts training course, participants will learn to:

  • Describe the Security Analytics architecture and components
  • Describe and customize the Security Analytics User Interface
  • Articulate the intelligence-driven process
  • Describe the features and functions of the Investigation Module
  • Access Live resources to enrich the data
  • Create and deploy custom feeds and create new metadata
  • Filter data for investigation using rules and custom actions
  • Automate analysis using alerts and reports
  • Communicate results using reports and charts
  • Describe the process for generating new intelligence
  • Create and implement parsers
  • Describe the features and functions of the Malware module
  • Analyze malware using the Investigation module
  • Investigate potential security issues based on specific use cases

What are the prerequisites for Security Analytics for Analysts Training?

Participants should be familiar with basic computer architecture, data networking fundamentals and general information security concepts. A background in Enterprise data networking and communications is required. Programming language experience is helpful. Basic knowledge of the TCP/IP protocol stack is useful.

Available Training Modes

Live Online Training

18 Hours

Classroom Training

3 Days

Course Outline Expand All

Expand All

  • Enterprise security evolution
  • Intelligence-Driven roadmap
  • Security Analytics Architecture and components - Appliances - Logs and packets - Data processing -
  • Licensing
  • RSA Security Analytics data - ttPackets, sessions, logs and resources - Data process flow - Data sources -
  • RSA Security Analytics User Interface
  • Customizing the User Interface
  • Obtaining data - tWhere to collect - ttBest practicest - ttFull packet capture - t
  • Investigation module navigation options
  • Configuring devices for investigation
  • Common use cases
  • Basic analysis techniques
  • Defining and refining sources
  • Live content
  • Accessing and deploying source data using Live subscriptions
  • Accessing sources for logs
  • Adding custom feeds
  • Adding custom metadata
  • Creating an intelligence-driven methodology
  • Filtering methodology
  • RSA Security Analytics filtering tools
  • Performing analysis using filtering tools and techniques
  • Using reports for communication, validation and investigation
  • Role based access control
  • Charts
  • Creating reports for Compliance
  • Creating reports to monitor the environment
  • Creating alerts for automated analysis
  • Generating new intelligence
  • Sample use cases for automating analysis
  • Introduction to parsers
  • Creating content using parsers
  • Packet parser structure and syntax
  • Creating content using Log parsers
  • Creating content using Lua parsers
  • Basic Lua concepts
  • Stages of the network forensics process
  • Forensics analysis
  • Malware analysis module
  • Malware analysis techniques - tEvent processing - ttSession analysis - ttStatic analysis - ttCommunity analysis - ttSandbox - t
  • Use case examples - tZero day attack - ttMalware evades sandbox - ttMalware defended by antivirus - t

Who is the instructor for this training?

The trainer for this Security Analytics for Analysts Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews