Course Description

This course provides you with the knowledge required to use advanced ArcSight ESM 7.0

content to find and correlate event information, perform actions such as notifying stakeholders,

graphically analyze event data, and report on security incidents. You will familiarize and/or

reinforce your understanding of the advanced correlation capabilities within ArcSight ESM that

provide a significant edge in detecting active attacks.

This course covers ArcSight security problem solving methodology using advanced ESM 7.0

content to find, track and remediate security incidents. During the training, you will use

variables and correlation activities, customize report templates for dynamic content, and

customize notification templates to send the appropriate notification based upon specific

attributes of an event.

Audience/Job Roles

This course is intended for:

Define their organization’s security objectives

Build or use advanced content to correlate, view and respond to those security

     objectives

 

Course Objectives

     Upon successful completion of this course, you should be able to:

Navigate ArcSight ESM console and command center to correlate, investigate, analyze

     and remediate both exposed and obscure threats

Construct ArcSight variables to provide advanced analysis of the event stream

Develop ArcSight lists and rules to allow advanced correlation activities

Optimize event-based data monitors to provide real-time viewing of event traffic and

     anomalies

Design new report templates and create functional reports

Find events through the search tools

Prerequisites/Recommended Skills

To be successful in this course, you should have the following prerequisites or knowledge:

Common security devices such as IDS and firewalls

Common network device functions, such as routers, switches, and hubs

TCP/IP functions such as CIDR blocks, subnets, addressing, and communications

Basic Windows operating system tasks and functions

Possible attack activities, such as scans, man in the middle, sniffing, DoS, and possible

abnormal activities, such as worms, Trojans, and viruses

SIEM terminology, such as threat, vulnerability, risk, asset, exposure, and safeguards

Completed the ArcSight ESM Administrator and Analyst ATP course or 6 months

experience administering ArcSight ESM