Course : Log collection and analysis, a SIEM to optimize your IS security

Practical course - 3d - 21h00 - Ref. LCA
Price : 2100 € E.T.

Log collection and analysis, a SIEM to optimize your IS security




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and enable you to quickly master the skills needed to implement a software solution tailored to your needs.


INTER
IN-HOUSE
CUSTOM

In person or remote class
Available in English on request

Ref. LCA
  3d - 21h00
2100 € E.T.




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and enable you to quickly master the skills needed to implement a software solution tailored to your needs.


Teaching objectives
At the end of the training, the participant will be able to:
Know your legal obligations regarding data retention
Log analysis approach
Installing and configuring Syslog
Understanding correlation and analysis with SEC

Intended audience
System and network administrators.

Prerequisites
Good knowledge of networks, systems and IS security.

Practical details
Numerous exercises and case studies will be proposed throughout the course.

Course schedule

1
Information gathering

  • Heterogeneous sources. What is a safety event?
  • Security Information and Event Management (SIEM). Events collected from the IS.
  • Equipment system logs (firewalls, routers, servers, databases, etc.).
  • Passive collection in listening mode and active collection.
Hands-on work
Log analysis procedure. Geolocating an address. Correlating logs from different sources, visualizing, sorting and searching for rules.

2
Optimizing IS security: tools, best practices, pitfalls to avoid

  • Overview of solutions and products.
  • Syslog study.
  • The SEC.
  • Splunk software.
  • French legislation.
Hands-on work
Installation and configuration of Syslog, SEC, Splunk, ELK and more. Example of data analysis and correlation.

3
Intrusion detection, the main issues

  • Understand network protocols (TCP, UDP, ARP, ICMP, routers, firewalls, proxies, etc.).
  • Attacks on TCP/IP (spoofing, denial of service, session theft, SNMP attacks, etc.).
  • Intelligence gathering, trace search, network scans.
  • Detect trojans, backdoors, browser bug exploits, covert channels, distributed denial-of-service agents...
  • Attacks and exploitation of vulnerabilities (takeover, DDoS, buffer overflow, rootkits, etc.).


Customer reviews
4,1 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
ANNABEL C.
11/03/26
4 / 5

Pas adapté à mon niveau mais très intéressantTP à refaire à mon rythme quand j’aurai acquis plus d’expérience et surtout plus de technique
ARNAUD P.
11/03/26
4 / 5

Formation très complète, j’aurais aimé un peu plus de temps sur syslog (tp et cours). Bon formateur à l’écoute.
RENAUD L.
19/01/26
5 / 5

The content is very comprehensive and the trainer is an extremely competent teacher.



Publication date : 07/24/2025


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Last places available
Guaranteed date, in person or remotely
Guaranteed session

REMOTE CLASS
2026 : 1 June, 9 Sep., 5 Oct., 16 Nov.

PARIS LA DÉFENSE
2026 : 1 June, 9 Sep., 5 Oct., 16 Nov.