Course Content

Module 1: Understanding SIEM’s Role in Security

01:35
1.1 Introduction
13:27
1.2 The Principal Functions, Limitations and Challenges of a SIEM Solution

Module 2: Inside the Security Analytics Process

08:04
2.1 The Security Analytics Process
04:05
2.2 The Concept of Threat Hunting

Module 3: Identify and mitigate Cyber Risk with CyberEASY

10:41
3.1 CyberEASY Installation and Dashboard Overview
08:01
3.2 Correlation of Events and Threat Hunting in CyberEASY

Course Description

This course focuses on the current perspective of cybersecurity analytics contrasted with the emerging trends over threat hunting and threat intelligence. The course will show the role of CyberEASY on threat intelligence and threat hunting and how CyberEASY can help the organization to better understand their cyber risks environment.

Prerequisites

This would be an appropriate course for a skilled online learner who has had some type of experience in the Cybersecurity field. They should understand at least the basics of cybersecurity, and how networks are protected nowadays.

Course Goals

By the end of this course, students should be able to:

❏ A. Understand the limitations of the current tools used in cybersecurity.

❏ B. Knowledge of the importance of cybersecurity analytics in a hostile environment.

❏ C. How to use CyberEASY to identify and mitigate cyber risk.

Instructed By

Instructor Profile Image
Ken Gilmour
Instructor

Delivered By

Knogin

Creator of CyberEASY delivering enterprise-level cybersecurity.

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Getting Started in Security Analytics with CyberEASY Certificate of Completion