SECURITY DELIVERED THROUGH APPLIED TRAINING
MICRO FOCUS ARCSIGHT TRAINING
Arcsight Logger – Administration And Operations (4 DAYS)
The ArcSight Logger 5.0 Administration and Operation course provides you with comprehensive training toquickly configure your Logger and bring it into an operational state. Learning content is specifically intended forteam members of security operations, network operations, auditing and compliance. This course includes hands-on exercises on common functionality and procedures to tailor and maintain theArcSight Logger appliance. It also include exercises to take advantage of built-in product content to fulfil eventsearch and reporting demands in enterprise log management environments
Arcsight Esm Advanced Analyst – ASE (5 Days)
ArcSight ESM 7 is the latest in the Microfocus ArcSight product suite. This course provides you with the knowledge required to use advanced HP ArcSight ESM content to find and correlate event information, perform actions such as notifying stakeholders, analyse event data graphically, and report on security incidents within your security environment. During the training, you will be able to use variable and correlation activities, customize report templates for dynamic content, and customize notifications.
Arcsight ESM Administrator And Analyst – 5 DAYS (ESM 200)
ArcSight ESM 7 is the latest in the Microfocus ArcSight product suite. In this introductory course learners use the ArcSight console and ArcSight Command Center user interfaces to monitor security events, configure ESM, and manage users and as well as ESM network intelligence resources. Using ArcSight ESM workflow, participants isolate, document, escalate, and resolve security incidents. The hands-on labs for this course use ESM version 7 During the training, you will be able to use variable and correlation activities, customize report templates for dynamic content, and customize notifications.
Arcsight Advanced Administrator – ASE (5 DAYS)
ArcSight ESM 7 is the latest in the Microfocus ArcSight product suite. This course provides you with techniques to proactively analyse and troubleshoot the ESM CORR engine database and Micro Focus ArcSight ESM Manager to provide efficient services to your organization. Micro Focus ArcSight ESM and other Micro Focus ArcSight appliances search for Logger, Connector Appliance, and the ArcSight Management Center products.
INFORMATION SECURITY TRAINING
Advanced Network Security Training (4 Days)
This course is about the realisation of IT Security on the level of network infrastructure. Usually security is implemented at single points of a network. The perspective from a network infrastructure often is not taken care of. The growing complexity of Network structures brings along many risks for secure traffic and high availability. This course empowers your intelligence on the kind of dangers there are on a network level and how efficient security measures can be implemented. The course includes real-world case studies and hands-on exercises.
Advanced Incident Response And Analysis Training (4 Days)
Security Incident analysts and threat responders have a challenging time understanding complex, multi-level attacks and APT adversary intrusions without pre-built indicators of compromise or threat intelligence gathered before a breach. One of the best ways to enhance capabilities is to test personal readiness in advanced attack scenarios.
Incident Response & Analysis Training(5 Days)
The course is based on the real-world experience of DataSixth consultants who have years of experience combatting sophisticated attacks. The course includes real-world case studies and hands-on exercises.. This course empowers security analysts with the right approach, tools and techniques to triaging, containing, investigating and learning from real-world incidents.
During this course attendees wants to learn basic principles as well as common and more advanced tricks to break modern security mechanisms. The subjects of this workshop cover network security, low level software exploitation, reverse engineering, web application hacking and more. Attendees will learn to learn to think and act like an attacker. Understanding their routine, tools and procedures will enable you to gain a novel perspective on your current setups and deployments. With this knowledge, you will find yourself most capable of locating and addressing the most pressing threats faster and more efficiently.