Publication date : 05/02/2024

Course : Log collection and analysis, a SIEM to optimize your IS security

Practical course - 2d - 14h00 - Ref. LOG
Price : 1480 € E.T.

Log collection and analysis, a SIEM to optimize your IS security




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and the skills you need to quickly implement a software solution tailored to your needs.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Disponible en anglais, à la demande

Ref. LOG
  2d - 14h00
1480 € E.T.




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and the skills you need to quickly implement a software solution tailored to your needs.


Teaching objectives
At the end of the training, the participant will be able to:
Know your legal obligations regarding data retention
Log analysis approach
Installing and configuring Syslog
Understanding correlation and analysis with SEC

Intended audience
System and network administrators.

Prerequisites
Good knowledge of networks, systems and IS security.

Practical details
Hands-on work
Numerous exercises and case studies will be proposed throughout the course.

Course schedule

1
Introduction

  • Information systems security.
  • Supervision and logging issues.
  • Standardization possibilities.
  • What are the advantages of centralized supervision?
  • Market solutions.

2
Information gathering

  • Heterogeneous sources. What is a safety event?
  • Security Event Information Management (SIEM). Events collected from the IS.
  • Equipment system logs (firewalls, routers, servers, databases, etc.).
  • Passive collection in listening mode and active collection.
Hands-on work
Log analysis procedure. Geolocating an address. Correlating logs from different sources, visualizing, sorting and searching for rules.

3
Syslog

  • Syslog protocol.
  • The client part and the server part.
  • Centralize event logs with Syslog.
  • Is Syslog enough? Advantages and disadvantages.
Hands-on work
Installation and configuration of Syslog. Example of data analysis and correlation.

4
The SEC program

  • Introducing SEC (Simple Event Correlator).
  • Configuration file and rules.
  • How do you detect interesting patterns?
  • Correlation and analysis with SEC.
Hands-on work
Installation and configuration of SEC. Example of data analysis and correlation.

5
Splunk software

  • MapReduce architecture and framework. How do you collect and index data?
  • Exploiting machine data. Transaction authentication.
  • Integration with LDAP directories and Active Directory servers.
  • Other software on the market: Syslog, SEC (Simple Event Correlator), ELK (Elastic suite), Graylog, OSSIM, etc.
Hands-on work
Installation and configuration of software (Splunk, ELK or other). Example of data analysis and correlation.

6
French legislation

  • How long logs are kept. Scope of use and legislation. The CNIL. Employment law.
  • The IT charter, its content and the validation process.
  • How do you set up an IT charter?
  • Its contribution to the safety chain.
Hands-on work
Example of an IT charter.

7
Conclusion

  • Best practices. Pitfalls to avoid. Choosing the right tools. The future for these applications.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 16 Mar., 22 June, 5 Oct., 16 Nov.

PARIS LA DÉFENSE
2026 : 16 Mar., 22 June, 5 Oct., 16 Nov.