SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOrganizations often spend a great deal of money on Log Management and Security Information and Event Management (SIEM), with disappointing results. Many organizations struggle with , and most SIEM vendors fail to provide effective out of the box correlations. Then too, many organizations fail in their vision and process, considering SIEM just another tool to be dropped onto the network. This paper covers common requirements and a process that has proven successful in multiple Log Management and SIEM, deployments in helping organizations meet both compliance needs, and improve their overall security strategy. A process including defining threats, documenting responses, and standard reporting to meet compliance regulations is detailed. Baseline correlations, reports, and compliance basics with reference links are provided in appendices.