This on-demand lab provides students with training on installing and configuring RSA NetWitness Logs & Network.
This self-paced on-demand lab walks you through the process of installing RSA NetWitness Logs & Network. Through a series of videos, you will first review the hardware components of a NetWitness Logs & Network implementation. You will then walk through how to install the various services, including: the Server, Decoders, the Concentrator, and Broker. You will then be shown how to configure the services and connect them together to allow data to flow through the system. After confirming data is flowing through the system, you will review the steps to check the health and wellness of the system. Lab exercises provide you with the ability to practice what you have learned. To maximize the value of your learning experience, this course also includes access to RSA University’s virtual environment.
Anyone interested in installing and configuring RSA NetWitness Logs & Network
Delivery Type On-Demand Lab (self-paced eLearning with Lab)
4 hour course and 2 hour lab
Note: RSA University’s lab environment is provided for 10 hours of overall practice time over a 14-day period.
Accessing the Lab Environment
Lab exercises are performed in the RSA University virtual lab environment. The downloadable Lab Guide provides detailed instructions on access the environment.
For more information please view the document Access RSA University Virtual Labs – available on the RSA University site:RSA University Content
Students should be familiar with basic computer architecture, networking fundamentals and general information security concepts. Basic knowledge of the TCP/IP protocol stack is beneficial. Students should have completed the following courses (or have equivalent knowledge) prior to taking this training:
RSA NetWitness Logs and Packets Introduction
Upon completion of this course, participants should be able to:
Explain elements of the proper process for installation and configuration
Successfully connect the hardware that will be used
Locate documentation and web-based resources for installation
Identify processes that require special attention during installation
Summarize the important configuration tasks Enable all host machines
Configure the environment to allow for data transmissions
Ensure data is flowing properly through the system