Four hours. Get a Log360 training certificate.
Learn how to:
✓ Secure your network against threats.
✓ Discover anomalies with event correlation.
✓ Audit devices and applications across your network.
✓ Conduct in-depth forensic investigations.
About the training and certification
A single solution for analyzing network activity, detecting internal and external threats, auditing your Active Directory environment, and staying compliant with regulatory policies—that's Log360 for you. This SIEM solution is an integration of two of our most powerful tools—ADAudit Plus and EventLog Analyzer - to give you a vast range of audit, security, and compliance features.
Join our product expert as she demonstrates these features and shows you how to ensure complete network security with Log360.
Using ADAudit Plus?
Check out the benefits of upgrading to Log360.
• Expand the scope of your auditing beyond Active Directory - gain insights from your routers, firewalls, applications, and more.
• Trace security incidents across multiple devices and conduct in-depth forensic investigations.
• Receive alerts based on the latest threat feed information.
Using EventLog Analyzer?
Check out the benefits of upgrading to Log360
• Conduct in-depth auditing of your Active Directory environment. Stay up-to-date on employee activity, including logons, logoffs, and account lockouts.
• Monitor your administrators closely and guard against privilege abuse and internal threats.
• Get fine-grained reports about changes made to critical files and folders.
The best part is, we even provide Log360 training completion certificates for all attendees. All you have to do is pass a short certification assessment conducted at the end of each of the four sessions in the series.
Complete the training and get certified.
July 10 Efficient threat mitigation
(a) An overview of Log360
(b) A typical use case on how to mitigate external attacks with EventLog Analyzer
•Detecting blacklisted IP traffic with the threat intelligence platform and built-in STIX/TAXII feed processor
•Setting up alerts to monitor critical resources
•Tracking incidents with the built-in incident management console
July 11 In-depth event correlation
In-depth event correlation
•An introduction to event correlation
•An example of how events across multiple log sources are correlated
•Analyzing security incidents with aggregated incident reports •Customizing attack patterns to reduce false positives
July 17 Comprehensive network auditing
Comprehensive network auditing
(a) Network device auditing
•Auditing critical activity in routers, switches, and firewalls using exhaustive reports
•A typical use case on how to deal with network intrusions
(b) Web server auditing
•Monitoring IIS and Apache web server activity
•A typical use case on how to get insight into web server performance
(c) Database auditing
•SQL Server autodiscovery
•Detecting changes to critical database values with column integrity monitoring
July 18 Custom log parsing and forensic investigations
Custom log parsing and forensic investigations
(a) Custom log parsing
•How Log360 audits custom log sources
•Extracting custom fields from a log Generating in-depth audit reports
(b) Forensic investigation
•Building complex search queries
•Searching through archived logs Conducting in-depth forensic investigations