USA:+1-703-445-4802
India:+91-8143111555 / +91-8790216888
Whats app: +91-8143110555
Showing posts with label RSA. Show all posts
Showing posts with label RSA. Show all posts
RSA NetWitness Administration Training in Hyderabad india

RSA NetWitness Administration Training in Hyderabad india

RSA NetWitness Administration 


The RSA NetWitness Administration training course focuses on administration of the RSA NetWitness product. This course provides an overview of RSA NetWitness, hands-on installation and configuration of components, including a Log Decoder, managing users, and creating filters and rules. Additionally, the course covers integration with other products, monitoring capabilities and troubleshooting of common issues.

Duration: 30hrs

Course Content:

RSA NetWitness Overview
  • RSA NetWitness architecture
  • RSA NetWitness components
  • Data flow between components
Appliance Setup and Software Installation
  • RSA NetWitness appliance setup
  • RSA NetWitness software components
Configuring RSA NetWitness
  • Managing Services
  • Configuring and Managing Devices
  • Setting up data collection of packets and logs
  • Viewing packets and logs in Investigator
RSA NetWitness Live
  • RSA NetWitness Live Overview
  • Configuring NetWitness Live subscriptions
  • Managing a Live feed
Managing Users
  • User management interface
  • User groups and roles
  • Creating users and groups
  • Viewing groups and roles
  • Configuring external authentication
  • Editing user settings
  • Informer roles
  • Creating Informer Users
Creating Rules and Filters
  • Rules, filters, feeds and parsers
  • Decoder filters and Informer rules
  • Best practices for creating filters and rules
  • Creating Decoder filters
  • Creating Informer rules and alerts
  • Creating a feed
  • Pushing a rule to the Decoder
  • Reprocessing a collection
Integrating RSA NetWitness with Other Products
  • NetWitness SIEM link
  • Setting up Informer to communicate with SIEM products
  • Connecting to HP ArcSight
  • The RSA enVision Connector
Monitoring RSA NetWitness
  • Tools that can be used to monitor RSA NetWitness components
  • Configuring SNMP
  • Monitoring NetWitness components for performance and efficiency
  • Tips and best practices for tuning the Decoder, Concentrator, Broker and Informer
  • Methods for viewing and modifying logs
Troubleshooting RSA NetWitness
  • Common problems
  • Investigating and resolving common problems
  • Troubleshooting tools

RSA Data Loss Prevention Policy and Classification Training in Hyderabad india

RSA Data Loss Prevention Policy and Classification Training in Hyderabad india

RSA Data Loss Prevention Policy and Classification



The RSA Data Loss Prevention Policy and Classification training course provides a comprehensive coverage in policy and classification for data loss prevention. This course centers around the RSA Data Loss Prevention Suite of products and on building the knowledge and skills to use the tools needed to detect sensitive content in the most accurate and efficient manner possible. This course also provides compliance officers and technical professionals with the knowledge and skills necessary to successfully safeguard enterprise content.

Duration: 25-30hrs

Course Content:

Search and Categorization Overview

  • Review search methodologies
  • Define how to measure accuracy
  • Define precision and recall
  • Compare ranks and weights
  • Review search features related to words, phrases, patterns, and entities
  • Define how proximity is used
  • Build an effective rule set


Regular Expression Basics

  • Define what regular expressions are and how they are used
  • List tools available to create and test regular expressions
  • Review detailed syntax for creating regular expressions
  • Analyze sample regular expressions
Building Content Blades
  • Create regular expressions to detect sensitive content
  • Identify the types of content blades
  • Review detection rules
  • Compare describing and fingerprinting content
  • Build described content blades
  • Compare and analyze file and database fingerprinting in detail
  • Review fingerprinting frequently asked questions
  • Build fingerprinted content blades
Content Blade Best Practices
  • Review described content blade best practices
  • Review fingerprinted content blade best practices
Building Policies
  • Define what policies are and how they are used
  • Review common policy features
  • Explain the relationship between policies and content blades
  • Use policies to identify sensitive content
  • Review DLP Network policy features
  • Review DLP Endpoint policy features
  • Review DLP Datacenter policy features
  • Configure policy-level remediation
  • Create and tune policies to increase recall and precision
  • Navigate the policy template library

Regulatory Compliance

  • Review existing regulatory compliance policies available in RSA DLP
  • Analyze FERC-related policies
  • Analyze HIPAA-related policies
Incidents and Events
  • Define what incidents and events are
  • View incident lists
  • Customize searches for incidents and events
  • Review available incident actions
  • Analyze incident and event details
Methodologies
  • Review best practices for building content blades
  • Research corporate policies
  • Gather test documents
  • Identify linguistic evidence
  • Build for recall
  • Tune for precision
  • Test for accuracy
  • Document detection rules





RSA Data Loss Prevention Administration Training in Hyderabad India

RSA Data Loss Prevention Administration Training in Hyderabad India

RSA Data Loss Prevention Administration Training Course


The RSA Data Loss Prevention Administration training course provides comprehensive instruction in the administration and configuration of the RSA Data Loss Prevention (DLP) Suite. Theory and product basics such as the RSA DLP Suite architecture, integration of RSA DLP components, and the importance of various configuration parameters are discussed.

Duration: 40hrs

Course Content:

Introduction to Data Loss Prevention
  • List the key features of the RSA DLP Suite
  • Identify the key components of the RSA DLP Suite
  • Describe the role of RSA DLP Enterprise Manager
  • Explain the differences between RSA DLP Network, Datacenter, and Endpoint
  • Define how policy violations are handled by RSA DLP Endpoint Enforce
Enterprise Manager Administration
  • Login to the Enterprise Manager for the first time
  • List the key features of Enterprise Manager
  • Access and license the Enterprise Manager
  • List new dashboard features
  • Review the Enterprise Manager tabs
  • Enter LDAP configuration settings
  • Perform user and group administration
  • Configure an email server and notifications
  • Delete incidents and events
  • Display device status
Network Appliance Configuration
  • Identify the main components of RSA DLP Network
  • Re-install an RSA DLP Network appliance
  • Login to an RSA DLP Network appliance
  • Perform an initial configuration of an appliance
  • Perform basic configuration for a RSA DLP Network Interceptor
  • Describe the Email Self Release feature
  • Evaluate sensor capacity needs
  • Diagram the ICAP server event flow
  • Perform a basic configuration of an ICAP server
Introduction to Policies
  • Explain the function of the RSA DLP Content Classification and Analysis system
  • Describe the use and purpose of policies in the DLP Suite
  • Explain how content blades are used in policies to detect sensitive information
  • Create policies using a supplied template
  • Configure DLP Network policies in a virtual network environment

DLP Datacenter
  • List key features and components of DLP Datacenter
  • Install the Enterprise Coordinator
  • Configure the Enterprise Coordinator
  • Describe the scan types available in DLP Datacenter
  • Install and configure a site coordinator
  • Create a grid scan group
  • View scan status and history
Creating Content Blades
  • Compare fingerprinting and describing content
  • List the detection accuracy methods available
  • Discuss the importance of weight, score and count
  • Discuss the importance of accuracy and precision
  • Explain how a risk score determines severity
  • Manage and create content blades
Working with Fingerprinted Content
  • Describe fingerprinting and hashes
  • Define fingerprinting terminology
  • Configure a file crawler
  • Configure a database crawler
Agent and Repository Scans
  • Analyze agent scan status
  • Configure an agent scan group
  • Schedule an agent scan
  • Analyze agent scan history
  • Configure a repository database scan
DLP Endpoint
  • Explain how DLP Endpoint Enforce works
  • List the components that comprise DLP Endpoint
  • Configure policy settings relevant to DLP Endpoint
  • Install DLP Endpoint Enforce agents
  • Create a DLP Endpoint Enforce group
  • Manually deploy a DLP Endpoint Enforce agent
Workflow and Remediation
  • Describe incident and event workflow within RSA DLP
  • Compare DLP remediation actions
  • Describe how manual remediation functions
  • View policy, incident, and transmission details
  • View incident history and notifications
Reports
  • Describe the main DLP reporting features
  • Navigate the Enterprise Manager dashboard
  • View and edit reports
  • Customize a report
  • Export report data
  • Create DLP Asset Heat Map reports
Basic Operations
  • Export and import DLP configuration files
  • Review backup options for DLP
  • Discuss high availability options for DLP components
  • Describe how to configure Enterprise Manager failover
  • Review Patching and upgrade operations for DLP
  • List the benefits of integrating DLP and RMS
  • Select and associate an RMS template for use with DLP