Dates and time
January 29, 30 and 31 | 18:00 EET
About the workshop
This workshop will give you insights on how to utilize the different modules and capabilities of Log360 to secure your network. We’ll discuss critical use cases and attack scenarios that can be mitigated and remediated using Log360. By the end of this workshop, you will be able to make better use of Log360 to secure your IT infrastructure. You’ll also receive a certificate upon completion of all the sessions of the workshop.
Prerequisites:
To attend the workshop, you need to:
- Ensure you have stable internet connectivity
- Join the workshop using the Zoom link that will be sent to your email upon registration
Key takeaways from the workshop
- Understanding log management and security auditing
- Using Log360 to identify advanced persistent threats, internal and external attacks, and incidents
- Utilizing predefined reports, alerts, correlation rules, and workflows, and customizing them as needed to suit your network
- Automating your incident management and response
- Detecting malicious user behavior in real time and mitigating it
Workshop agenda:
Session 1 – Getting started with Log360
- What is Log360?
- Configuring log sources and Custom Log Parsing
- Creating technicians and assigning roles
- Dashboards, reports and searching through logs
- Managing compliance requirements
Session 2 – Detecting, responding and managing security Incidents
- Threat Intelligence and MITRE framework for advanced threat detection
- Alerting and event correlation
- Response workflows: Your first line of defense
- Tracking and managing incidents centrally
Session 3 – User activity and risk monitoring
- AD server monitoring
- User and entity behavioral analytics(UEBA): ML based anomaly detection
- Monitoring cloud applications usage
- Managing sensitive data and risks