India: +91 406677 1418

WhatsApp no. : +919100386313

USA: +1 909 233 6006

Telegram : +15168586242

RSA Security Analytics Training

RSA Security Analytics Training

RSA Security Analytics Training Introduction:

RSA Security Analytics constantly need to adapt to stay in front of attackers and the latest threats, but over the past few years this has become much more difficult. Attackers continue to advance and use sophisticated and highly targeted techniques to infiltrate organizations. RSA Security Analytics enables security teams to focus on the most important incidents, and rapidly investigate them using network data.

With Global Online Trainings the RSA Security Analytics Training is coordinated by best industry experts and the RSA Security Analytics tutorial is prepared with best industry updates for offering participants best professional insight over modules. The training is available for individual and corporate batches. To know more about this online training course contact reach at helpdesk of Global Online Trainings today.

RSA Security Analytics 10.6 Administration Online Training Course Content

TOPIC 1: Overview of RSA Security Analytics
  • Architecture of RSA Security Analytics 10.6
  • Components of RSA Security Analytics Training
  • Licensing
  • Packets, sessions, logs, and content
  • Data flow
  • Data sources
  • Deployment scenarios
  • Deployment considerations
  • The Virtual Environment
  • Security Analytics interface
  • Customizing the interface
TOPIC 2: RSA Security Analytics Training Configuration
  • Adding devices
  • Device groups
  • Concentrator settings
  • Decoder settings
  • Configure Live Manager
  • Custom feeds
  • Configuration files
  • Configure the Reporting Engine
  • Configure Context Sensitive Menus
  • Configure the Warehouse
  • Configure Spectrum
TOPIC 3: Setting Up Data Collection
  • Setting up capture for packets and log data
  • Configuring log collection
  • Setting up collection for File Reader
  • Setting up collection for Windows
  • Setting up collection for ODBC
  • Setting up collection for Check Point
  • Testing data capture
TOPIC 4: Managing Users
  • Overview of User administration
  • Users, groups, roles, and permissions
  • Managing Security Analytics users
  • Configuring external authentication
  • Managing Spectrum users

 

TOPIC 5: Creating Rules, Reports, and Alerts
  • Rules overview
  • Rules data flow
  • Navigating data
  • Reports
  • Alerting
TOPIC 6: Monitoring the environment
  • Viewing statistics
  • Monitoring devices
  • Monitoring query performance
  • Monitoring Concentrator aggregations
  • Tuning the index
  • Resetting the databases
  • Viewing logs
  • REST API
  • Crash Reporter
TOPIC 7: Migrating from enVision to Security Analytics
  • RSA Security Analytics Training includes hands-on labs designed to give you practical experience

Skills Gained from RSA Security Analytics:

  • Architecture of RSA Security Analytics
  • RSA Security Analytics Training data sources, including the Warehouse
  • Licensing process
  • Security Analytics User Interface
  • Customize the interface
  • Configure and license devices
  • Create device groups
  • Add users and groups
  • Set roles and permissions for users and groups
  • Configure external authentication
  • Configure data capture including log collection
  • Configure Live Manager
  • Deploy feeds to the Decoder
  • Configure the Reporting Engine
  • Create filters and rules on the Decoder
  • Configure Spectrum
  • Use the REST API for basic tasks
  • Monitor the environment
  • Identify and resolve issues
  • Migrating from enVision to RSA Security Analytics 10.5

Objectives of RSA Security Analytics Training:

After successful completion of this course, participants should be able to:

  • Architecture of the Security Analytics
  • licensing process Overview
  • Describe the Security Analytics User Interface
  • Customize the interface
  • Configure and license devices
  • Create device groups
  • Add users and groups
  • Set permissions for users and groups
  • Configure external authentication
  • Configure data capture including log collection
  • Configure event sources
  • Configure Live Manager
  • Deploy feeds to the Decoder
  • Configure the Reporting Engine
  • Create filters, rules, reports, alerts and charts
  • Use the REST API for basic tasks
  • Monitor the environment
  • Identify and resolve issues
  • Describe the RSA ECAT integration process

Key Benefits:

  • Detect and analyze even the most advanced of attacks before they can impact the business
  • Investigate, prioritize, and remediate incidents with unprecedented precision and speed.
  • Unleash the potential of the existing security team to get the upper hand on attackers
  • Evolve existing SIEMs and monitoring toolset with better visibility and workflow