• Firewalls are no longer sufficient to prevent intrusions.  In the era of zero day exploits and increased level cyber threats, if an organization gets attacked in no longer as an option, but simply a matter of when.  Is the organization ready and prepared for the next attack?

    SIEM stands for Security Information Event Management, which is a method of security management that utilizes security information management (SIM) and security event management (SEM) functions to create one security management system. SEM functions carry out the analysis of event and log data in real-time. SIM functions are designed to retrieve and analyze log data and generate reports.

    SIEM Training is very important technology for the cyber security and compliance.  That means the basic function of the SIEM is nothing but to centralize all the security notifications from various technologies. Your Intrusion Detection System and Intrusion Prevention Systems, firewalls, wireless access points, antivirus console and Active directory servers all generate lots of security alerts daily. We can combine all of these in one single place with single report sets and one centralized system to generate notifications. This program is designed to introduce you to the intricate world of SIEM and Logs.

    This course is a part of Professional Diploma in cyber investigation and law affiliated to Hindustan University. Please more information refer here. This is also offered as a stand alone course for highly focused aspirants.

    Mode of delivery:

    The course is offered as a full time course course as a part of University offering. It is also offered as online program.The course is offered in English.

    Code of conduct

    Ethical behavior is an important part of this course. Since some of the methods, codes and tools that will be discussed and experimented in the course can be very harmful, if abused, it is expected that students will behave in a responsible manner. In particular, always ask your local site administrator for permission before experimenting with security-related tools. In-class discussions of techniques for exploiting potential security threats and risks do not imply to use them! You will be sole responsible for any such violation.