Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Google

Network Traffic and Logs Using IDS and SIEM Tools

Google via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you will be provided with a conceptual overview of logs and their role in Intrusion Detection Systems (IDSs) and Security Information and Event Management tools (SIEMs). The course will discuss the general concept of an IDS and how it works to detect attacks before highlighting specific IDS and SIEM products, such as Suricata, Splunk and Google SecOps (Chronicle), respectively. You will then develop an understanding of how to access and navigate within Suricata and how basic rules are set up to provide alerts, events, and logs for malicious network traffic. This course will conclude with an introduction to Splunk and Google SecOps (Chronicle) and will showcase some of their features, including common commands. By the end of this course, you will be able to: - Discuss the importance of logs during incident investigation - Determine how to read and analyze logs during incident investigation - Describe how common intrusion detection system (IDS) tools provide security value - Interpret the basic syntax and components of signatures and logs in IDS and NIDS tools - Describe how SIEM tools collect, normalize, and analyze log data - Perform queries in SIEM tools to investigate an incident

Syllabus

  • Overview of logs
    • In this module, you will be provided with a conceptual overview of logs and their role in Intrusion Detection Systems (IDSs) and Security Information and Event Management tools (SIEMs). The module will highlight the importance of logs, best practices for log collection and management, the variations of logs, and provide an overview of log file formats.
  • Overview of intrusion detection systems (IDS)
    • This module will discuss the general concept of an IDS and how it works to detect attacks before highlighting specific IDS and SIEM products, such as Suricata, Splunk and Google SecOps (Chronicle), respectively. Learners will then develop an understanding of how to access and navigate within Suricata and how basic rules are set up to provide alerts, events, and logs for malicious network traffic.
  • Overview of security information event management (SIEM) tools
    • In this module, you will get an introduction to Splunk and Google SecOps (Chronicle). The module will describe log sources and log ingestion and provide information on search methods with SIEM tools.
  • Review: Network traffic and logs using IDs and SIEM tools
    • Review everything you’ve learned and take the final assessment.

Taught by

Google Career Certificates

Reviews

4.8 rating at Coursera based on 13 ratings

Start your review of Network Traffic and Logs Using IDS and SIEM Tools

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.