This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Education Courses
  • NetWitness Community
  • NetWitness Education
  • Courses
  • NetWitness Platform Analysis 11.6 ILT
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
No ratings

NetWitness Platform Analysis 11.6 ILT

ElynnKoh
Contributor ElynnKoh Contributor
Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

on ‎2021-10-25 06:27 AM - edited 3 weeks ago by Occasional Contributor aymanm2 Occasional Contributor

Netwitness-Education-2C (2).png


Access Training
for Customers/Partners
Access Training
for NetWitness Employees

 

 

 

$2,000 USD

 

 

2,000 Training Credits

 

 

 

This is an Instructor Led Training class, for On-Demand/Self-Paced please click here

 

Summary

This course presents a recommended process for responding to incidents using NetWitness Platform analysis tools and techniques.  Students practice the techniques and process by working through a series of use cases.
This is an update to version 11.6. 

 

Overview

This course covers how to use the NetWitness 11.6 platform including logs, packets and Advanced Endpoint, to respond to incidents by investigating incidents in the queue, documenting incidents, and escalating or closing incidents.   

Students will use NetWitness Platform Investigation features to analyze incidents using a recommended process. 

 

Audience

Level 1 and Level 2 analysts relatively new to NetWitness Platform, who wish to increase their familiarity with the tool’s features and functions within the context of incident response and analysis.

 

Duration: 2 days

 

Prerequisite Knowledge/Skills

NetWitness Platform Foundations 

Students should have familiarity with the basic processes of cybersecurity analysis, including some knowledge of network architecture, the TCP/IP stack, networking protocols, and integrating log & network traffic to perform analysis on network-based security events.

 

Course Objectives

Upon completion of this training, the learner should be able to: 

  • Identify Analyst roles and SOC models 
  • Describe incident types and methods to prioritize incidents 
  • Describe the Incident Response process 
  • Use tools and methods to filter data and enhance the dataset 
  • Use analysis tools and interfaces to perform incident response 
  • Describe the Investigative Methodology 
  • Describe a systematic approach to investigate metadata 
  • Identify types of threats 
  • Use the incident response process, the investigative methodology and tools to investigate multiple use cases using packets, logs and endpoint

 

Course Outline

Module 1: Analysis Tools and Processes 
Module 2: Investigating Metadata 
Module 3:
Analysis Use Cases

 

 
If you have any questions, please contact your account manager or Contact Us directly!

 

 

Was this article helpful? Yes No
3 Likes
Share
Version history
Last update:
3 weeks ago
Updated by:
Occasional Contributor aymanm2 Occasional Contributor
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.