Visão Geral
O curso Datadog Security Monitoring (SIEM) tem como objetivo capacitar profissionais na utilização da plataforma Datadog para monitoramento de segurança, detecção de ameaças e resposta a incidentes. O treinamento aborda conceitos de SIEM (Security Information and Event Management), correlação de eventos, análise de logs de segurança e implementação de controles para proteção de ambientes on-premises e cloud.
Conteúdo Programatico
Module 1 – Introduction to SIEM and Security Monitoring
- SIEM concepts and architecture
- Security monitoring fundamentals
- Threat landscape overview
- Datadog Security Monitoring overview
- Use cases and benefits
Module 2 – Log Collection for Security
- Security log sources (OS, network, applications, cloud)
- Log ingestion methods
- Structuring and normalizing logs
- Security-focused log pipelines
- Data enrichment techniques
Module 3 – Threat Detection and Rules
- Detection rules and signals
- Out-of-the-box vs custom rules
- Correlation of events
- Indicators of compromise (IOCs)
- MITRE ATT&CK framework mapping
Module 4 – Security Analytics and Investigation
- Security signals and alerts
- Log Explorer for investigations
- Timeline and event correlation
- Threat hunting techniques
- Root cause analysis
Module 5 – Incident Response and Automation
- Incident lifecycle management
- Response playbooks
- Workflow automation
- Integration with ticketing systems
- Communication during incidents
Module 6 – Cloud Security Monitoring
- Monitoring AWS, Azure, and GCP security events
- Identity and access monitoring
- Configuration and compliance checks
- Container and Kubernetes security
- Cloud threat detection
Module 7 – Compliance and Reporting
- Compliance frameworks (ISO, SOC 2, PCI-DSS, etc.)
- Audit logs and reporting
- Evidence collection
- Dashboards for compliance
- Continuous compliance monitoring
Module 8 – Optimization and Best Practices
- Reducing false positives
- Tuning detection rules
- Cost optimization
- Security monitoring maturity model
- Continuous improvement strategies