Overview
Master Detection Engineering and SIEM analytics to identify adversaries hiding in your environment. Transform security data into actionable intelligence through hands-on training.
What You Will Learn:
Detection Engineering Fundamentals
- Build and configure detection lab environments
- Write detection rules to identify adversary behaviors
- Optimize SIEM architecture for performance and visibility
- Perform adversary emulation and analyze log activity
Log Analysis and Monitoring
- Analyze DNS, HTTP, and Windows logs for threats
- Configure log collection and enrichment pipelines
- Build effective dashboards and correlation rules
- Hunt for threats using security data
Cloud and Endpoint Detection
- Monitor AWS and Azure cloud environments
- Configure Microsoft Sentinel and KQL queries
- Implement automated detection engineering pipelines
- Perform post-mortem analysis and improvement
18 hands-on labs include MITRE DeTT&CT gap analysis, DNS log investigation, HTTP log analysis, Windows log examination, inventory-based threat hunting, Azure cloud logging, AWS lab configuration, Sigma coverage analysis, and a Defend-the-Flag team challenge.
The course culminates in a team-based design, detect, and defend the flag competition covering logging architecture, log augmentation, network and system log analysis, and dashboard development.
Prepares for GIAC GCDA certification (exam sold separately). Ideal for SOC Analysts, Detection Analysts, Security Engineers, and Threat Hunters.
30 CPE credits. 5 days of expert-led training.
Highlights
- Build and configure your own detection lab environment. Write detection rules to identify adversary behaviors. Optimize SIEM architecture for better performance and visibility. Perform adversary emulation and analyze related log activity
- Comprehensive hands-on training with 18 practical labs covering: Using MITRE DeTT&CT to Identify Monitoring Gaps, Investigating DNS Logs, Investigating DNS Logs, Using inventory data for threat hunting, Using inventory data for threat hunting, Logging Unauthorized Access to Sensitive Data, Logging Unauthorized Access to Sensitive Data, Identify Log Gaps and Compare With Sigma Coverage and 1 more exercises
- Certification: Prepares for GCDA. Earn 30 CPE credits. 5 days of intensive training. Business outcomes: Identify and mitigate threats in near real-time to reduce business risk
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
SEC555 - Single User | Single user license for Defense - SEC555: Detection Engineering & SIEM Analytics | $8,260.00 |
Vendor refund policy
Refunds available within 30 days if course not accessed.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
