SOC LEVEL 1
Ctrlk
  • Path 1
    • Cyber Defense Framework
  • PATH 2
    • Cyber Threat Intelligence
  • PATH 3
    • Network Security and Traffic Analysis
  • PATH 4
    • Endpoint Security Monitoring
  • PATH 5
    • Security Information and Event Management
      • Introduction to SIEM
      • Investigating with ELK 101
      • ItsyBitsy
      • Splunk: Basics
      • Incident Handling with Splunk
      • Investigating with Splunk
      • Benign
  • PATH 6
    • Digital Forensics and Incident Response
  • PATH 7
    • Phishing
Powered by GitBook
On this page
  1. PATH 5

Security Information and Event Management

Introduction to SIEMInvestigating with ELK 101ItsyBitsySplunk: BasicsIncident Handling with SplunkInvestigating with SplunkBenign
PreviousWazuhNextIntroduction to SIEM

Last updated 3 years ago