watching now
4 Students
25 Lessons
Beginner

What Will You Learn?

  • Understand and Manage Vulnerabilities
  • Email: SMTP, Email system, webmail architecture - IMAP4 based, Email based attacks - social engineering, proxy server
  • Learn more on Security Devices, Encryption, Reliable passwords, use of anti-virus software and modern advanced network security devices.
  • You will have clarity on what an Anti-Virus is, types of Anti-Virus products, how does Anti-virus work and examples of Anti-virus software's

Curriculum

16h 20m
Section 1: Introduction to SIEM
06:55
Section 2: Key Objectives of SIEM
01:56
Section 3: Defence in Depth
04:22
Section 4: Corporate environment
04:00
Corporate environment
04:00
Section 5: Log Management
11:15
Log Management
11:15
Section 6: Top Use Cases for SIEM
17:02
Use Cases for SIEM
17:02
Section 7: Why is SIEM necessary?
10:25
Why is SIEM necessary?
10:25
Section 8: Elements of SIEM
42:10
Elements of SIEM
42:10
Section 9: SIEM Deployment Options
28:41
SIEM Deployment Options
28:41
Section 10: Introduction to Splunk's user interface
1:35:48
Introduction to Splunk's user interface
1:35:48
Section 11: Splunk: Using basic transforming commands
07:38
Splunk: Using basic transforming commands
07:38
Section 12: Splunk: Creating Reports and Dashboards
23:02
Splunk: Creating Reports and Dashboards
23:02
Section 13: Splunk: Saving and sharing reports
04:23
Splunk: Saving and sharing reports
04:23
Section 14: Splunk: Dashboards
09:18
Splunk: Dashboards
09:18
Section 15: Splunk: Creating alerts
44:16
Splunk: Creating alerts
44:16
Section 16: Splunk Enterprise Security
5:44:38
Enterprise Security Part 1
1:15:36
Enterprise Security Part 2
45:35
Enterprise Security Part 3
58:40
Enterprise Security Part 4
2:44:47
Section 17: Types of Viruses
1:14:51
VIruses
1:14:51
Section 18: Security Devices
1:52:42
Security Devices
1:52:42
Section 19: Email: SMTP, Email system, webmail architecture - IMAP4 based
33:20
Email
33:20
Section 20: Cyber security incidence response
37:42
Incident Response
37:42
Section 21: Vulnerability Management
1:06:30
Vulnerability Management
1:06:30
Section 22: Assessment
00:03
Answer Yourself

Description

Requirements

  • Basics of cyber security and networking
  • SOC Analysts, Cyber Security Enthusiasts, IT Security Specialists and those who are looking for a career in SOC - Security Operations Center

About the Instructor

100% of students rated this instructor as excellent!
Reviews 0
Students 167
Courses 3

I care for knowledge transfer because knowledge is power, it helps get food on the table. Hence I work with my partners and friends who work in the IT Industry and come up with learning programs and courses which can help quickly build competency levels which can help a student or a professional get a job!
Hence I focus more on tool-based learning which helps to get hands-on knowledge thus accelerating the chances to get placed in a corporate!
Presently my focus is on Data Science and Cyber Security Domains! A warm welcome to those who are interested to build their practical knowledge using our courses on Bitdegree!

BitDegree platform reviews

Our students say Excellent
9.5 out of 10
trustpilot logo 1 trustpilot logo