Home / Training / SIEM Implementation

SIEM Implementation

Master intrusion detection, log centralization, and modern monitoring with SIEM.

Objective

This course is a practical guide aimed at presenting defensive technologies around SIEM terminology and intrusion detection. The content is vendor-independent and aims to provide a global and impartial view of functional and technical aspects. The objective is to provide trainees with the tools and knowledge necessary to approach a market where solutions are multiple, complex, and sometimes difficult to distinguish.
We will first study the implementation of intrusion detection probes using Suricata and OSSEC solutions. Trainees will learn to write Snort and OSSEC detection rules in particular.

Specific objectives:

  • Understand the limitations of traditional security tools
  • Discover the technological principles behind the SIEM acronym

Prerequisites

  • Mastery of Linux administration
  • Good network/system knowledge
  • Scripting fundamentals

General Information

  • Code: MSIEM
  • Duration: 4 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, Centre Urbain Nord, Tunis

Target Audience

  • Security consultants
  • Engineers / Technicians
  • Technical managers

Resources

  • Training materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Role of intrusion detection terminology
    • False positives, detection, prevention, etc.
    • Architecture and types of IDS
    • Suricata IDS presentation
    • Rule writing language - Practical Work
    • Setting up an IDS architecture
    • Attack scenarios and creating detection rules (scans, brute force, vulnerability exploitation)
  • Day 2
    • OSSEC HIDS presentation and architecture
    • Deployment and basic configuration
    • Rule writing syntax - Practical Work
    • Rule writing
    • IDS limitations
    • Important points in the context of a tender
  • Day 3
    • Modern challenges posed to traditional monitoring
    • SIEM objectives
    • Architecture and functionalities
    • Syslog and log centralization
    • Time synchronization (NTP)
    • ELK presentation
    • Advanced Logstash configuration
  • Day 4
    • Practical Work
    • Logstash agents configuration
    • Writing advanced Groks
    • Heterogeneous environment: Linux, Windows
    • Results visualization in Kibana
    • Conclusion
    • Discussion on alternative solutions
    • Preparation of key points for a tender

Don't hesitate to contact our experts for any additional information, free study and audit service calculation.

Information security is essential for any business that must protect and improve its information assets.

Contact us