As businesses innovate and make ground-breaking developments in the markets they operate within, successes can become reasons for advanced cyber threats to target your organization. In this course, Security Event Triage: Statistical Baselining with SIEM Data Integration, you will gain the ability to perform detection and analysis of threats at scale. First, you will learn which leg events to look for to identify suspicious activity. Next, you will discover how to pivot between indicators to find the root cause of the incident. Finally, you will explore how to correlate events from multiple sources across your estate to identify the actions on objective of the attacker as well as the impact. When you’re finished with this course, you will have the skills and knowledge of data analysis and baselining needed to detect threats at scale.
Cristian is a Information Security Professional with experience in supply chain, manufacturing, gaming, and
entertainment sectors for Fortune 500 companies. He has provided expertise in incident response cases by
performing forensic investigations, malware analysis, and elaborating mitigation plans against
complex cyber attacks.
Course Overview Hi, everyone. My name is Cristian Pescariu and welcome to my course security event triage, statistical based lining with seem data integration. I'm on information security professional and a Pluralsight author. Traditional log analysis is becoming more impractical for the increased quantities of data that are required for efficient incident Handling. New techniques and capabilities are paving the way for next gen threat detection, as well as a stepping stone for security, orchestration, automation and response. In these course, we're going to consume aggregated security events collected with the last extract to gain full visibility into modern attacks. Some of the major topics that will cover include detecting analyzed covert commanding control channels, investigate follow smaller Dex, detect advanced credential dumping techniques and correlate events to triage adversary groups. By the end of the scores, you'll know how to leverage their last X tack toe craft enhanced detections to hunt for malicious activity Before beginning the course, you should be familiar with handling and responding to security incidents. From here, you should feel comfortable diving into more courses from the security than three arch learning path around network and endpoint security. I hope you'll join me on this journey to learn threat hunting with the security of entry AJ statistical based lining with seem data integration course at Pluralsight.