Formation en Cybersécurité: SIEM – Advanced Exploitation of Security Logs and Threat Detection - Ascent Formation
Back to trainings
Cybersécurité

SIEM – Advanced Exploitation of Security Logs and Threat Detection

5 jour(s)35h

Description

Training objective: Learn to design, operate, and optimize a SIEM solution to detect threats, correlate events at scale, build useful dashboards, create relevant alerts, and identify abnormal behaviors across networks, systems, and cloud environments.

Learning Objectives

  • Design a coherent and scalable SIEM architecture
  • Select, collect, and normalize the right logs
  • Transform raw logs into actionable insights
  • Define relevant alert rules and effective dashboards
  • Detect anomalies based on behavioral baselines
  • Integrate cloud logs, containers, and automate certain tasks
  • Evaluate the effectiveness of security controls through logs

Target Audience

SOC analysts, security engineers, system administrators
Cybersecurity consultants, technical auditors
Supervision or detection managers

Prerequisites

Strong knowledge of systems (Windows, Linux), networking, and security.
Comfort with log formats and structured data processing.
Scripting or data manipulation skills are appreciated.

Program Outline

Informations

Duration

5 jour(s)

35h

Tarif

3450 € HT

HT

    SIEM – Advanced Exploitation of Security Logs and Threat Detection | Ascent Formation | Ascent Formation