Network Monitoring Expert

curs_network_monitoring

Systems currently generate a large amount of data, and it is necessary to create environments that allow information to be centralized to optimize analysis. In this course, aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.

In the event that the student does not have knowledge of computer security, it is recommended that before taking this course, he completes the introductory course to Computer Security.

 

Network Monitoring Expert

Contents

  1. System logs
    • Logs in Windows
    • Logs in Linux
    • LAB: Analysis of Windows Events
  2. Threat detection and monitoring systems against servers
  3. Collection and correlation of events
    • LAB: OSSEC
  4. Log analysis
    • LAB: OSSIM
    • LAB: Splunk
  5. Good Practices

Benefits for the participant

  • Develop the ability to understand and be able to monitor systems and networks to effectively detect different types of IT threats.
  • Obtain the recognized accreditation in Network Security Manager once the rest of the requirements have been met.
  • Detect and monitor different types of threats against servers and know the best practices in the field.
  • Acquire theoretical and practical knowledge highly valued by the market and ICT departments of all types of public and private organizations.

To whom it is addressed

  • IT security managers and technicians of ICT departments of organizations who want to be up to date in the field of system and network monitoring.
  • Computer Science and/or Telecommunications students who want to orient their professional career in the area of computer security.
  • Professionals who, with minimal knowledge, are interested in expanding their theoretical and practical knowledge in a subject of increasing importance such as Cybersecurity.