Visão Geral
Este Curso Log Analysis para Seguranca da Informação SIEM, capacita profissionais a utilizar plataformas SIEM (Security Information and Event Management) para coletar, correlacionar e analisar logs com foco na detecção de ameaças, resposta a incidentes e monitoramento contínuo de segurança.
A formação combina teoria e prática em ambientes de SOC (Security Operations Center), abordando o uso de ferramentas como Splunk, Elastic Stack (ELK), IBM QRadar e Microsoft Sentinel, permitindo aos participantes implementar casos reais de uso em segurança.
Conteúdo Programatico
Module 1: Introduction to SIEM and Security Logging
- What is SIEM
- Importance of Log Analysis in Security
- Types of Security Logs
- Security Monitoring Concepts
Module 2: Log Collection and Normalization
- Log Sources (Servers, Applications, Network Devices)
- Log Collection Methods
- Data Normalization and Parsing
- Log Enrichment Techniques
Module 3: SIEM Architecture and Components
- SIEM Core Components
- Data Ingestion and Storage
- Correlation Engine
- Dashboards and Reporting
Module 4: Event Correlation and Detection
- Correlation Rules
- Signature-based vs Behavior-based Detection
- Creating Detection Use Cases
- Threat Detection Techniques
Module 5: Security Use Cases
- Brute Force Detection
- Unauthorized Access
- Privilege Escalation
- Data Exfiltration Detection
Module 6: Alerting and Incident Management
- Alert Generation and Tuning
- Reducing False Positives
- Incident Classification and Prioritization
- Integration with Incident Response
Module 7: Investigation and Analysis
- Log Search and Query Techniques
- Event Correlation for Investigation
- Timeline Analysis
- Root Cause Identification
Module 8: Threat Intelligence Integration
- What is Threat Intelligence
- Integrating TI with SIEM
- Indicators of Compromise (IoCs)
- Enrichment with External Data
Module 9: Compliance and Reporting
- Compliance Requirements (LGPD, GDPR, ISO 27001)
- Audit Logging
- Security Reports and Dashboards
- Governance and Policies
Module 10: Advanced SIEM Concepts
- UEBA (User and Entity Behavior Analytics)
- Automation and SOAR Integration
- Cloud SIEM
- AI in SIEM
Module 11: Final Project (Hands-on)
- Configuring a SIEM Environment
- Creating Correlation Rules
- Detecting Simulated Attacks
- Incident Investigation and Reporting