Course : Log collection and analysis, a SIEM to optimize your IS security

Practical course - 3d - 21h00 - Ref. LCA
Price : 2470 CHF E.T.

Log collection and analysis, a SIEM to optimize your IS security




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and enable you to quickly master the skills needed to implement a software solution tailored to your needs.


INTER
IN-HOUSE
CUSTOM

In person or remote class
Available in English on request

Ref. LCA
  3d - 21h00
2470 CHF E.T.




This training course will give you an overview of supervision issues, the legal obligations involved in data retention, and enable you to quickly master the skills needed to implement a software solution tailored to your needs.


Teaching objectives
At the end of the training, the participant will be able to:
Know your legal obligations regarding data retention
Log analysis approach
Installing and configuring Syslog
Understanding correlation and analysis with SEC

Intended audience
System and network administrators.

Prerequisites
Good knowledge of networks, systems and IS security.

Practical details
Numerous exercises and case studies will be proposed throughout the course.

Course schedule

1
Information gathering

  • Heterogeneous sources. What is a safety event?
  • Security Information and Event Management (SIEM). Events collected from the IS.
  • Equipment system logs (firewalls, routers, servers, databases, etc.).
  • Passive collection in listening mode and active collection.
Hands-on work
Log analysis procedure. Geolocating an address. Correlating logs from different sources, visualizing, sorting and searching for rules.

2
Optimizing IS security: tools, best practices, pitfalls to avoid

  • Overview of solutions and products.
  • Syslog study.
  • The SEC.
  • Splunk software.
  • French legislation.
Hands-on work
Installation and configuration of Syslog, SEC, Splunk, ELK and more. Example of data analysis and correlation.

3
Intrusion detection, the main issues

  • Understand network protocols (TCP, UDP, ARP, ICMP, routers, firewalls, proxies, etc.).
  • Attacks on TCP/IP (spoofing, denial of service, session theft, SNMP attacks, etc.).
  • Intelligence gathering, trace search, network scans.
  • Detect trojans, backdoors, browser bug exploits, covert channels, distributed denial-of-service agents...
  • Attacks and exploitation of vulnerabilities (takeover, DDoS, buffer overflow, rootkits, etc.).


Customer reviews
4,1 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
ANNABEL C.
11/03/26
4 / 5

Pas adapté à mon niveau mais très intéressantTP à refaire à mon rythme quand j’aurai acquis plus d’expérience et surtout plus de technique
ARNAUD P.
11/03/26
4 / 5

Formation très complète, j’aurais aimé un peu plus de temps sur syslog (tp et cours). Bon formateur à l’écoute.
RENAUD L.
19/01/26
5 / 5

The content is very comprehensive and the trainer is an extremely competent teacher.



Publication date : 07/24/2025


Dates and locations

Last places available
Guaranteed date, in person or remotely
Guaranteed session
From 1 to 3 June 2026
FR
Remote class
Registration
From 9 to 11 September 2026
FR
Remote class
Registration
From 5 to 7 October 2026
FR
Remote class
Registration
From 16 to 18 November 2026
FR
Remote class
Registration

REMOTE CLASS
2026 : 1 June, 9 Sep., 5 Oct., 16 Nov.