Micro Focus ArcSight ESM Advanced Training Course
Micro Focus ArcSight ESM (Enterprise Security Manager) represents a comprehensive Security Information and Event Management (SIEM) solution designed to assist organizations in detecting, analyzing, and responding to cybersecurity threats and incidents in real-time.
This instructor-led, live training (available online or onsite) targets advanced-level security analysts seeking to enhance their proficiency with advanced Micro Focus ArcSight ESM capabilities. The course aims to improve an organization's capacity to detect, respond to, and mitigate cyber threats with greater precision and speed.
Upon completion of this training, participants will be able to:
- Optimize the deployment of Micro Focus ArcSight ESM to strengthen monitoring and threat detection capabilities.
- Build and manage advanced ArcSight variables to refine event streams for more accurate analysis.
- Develop and implement ArcSight lists and rules to facilitate effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns and minimize false positives.
Format of the Course
- Interactive lecture and discussion.
- Extensive exercises and practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to ArcSight ESM
- Overview of SIEM and ArcSight ESM
- Understanding the ArcSight ESM architecture
Configuring ArcSight Connectors
- Types of ArcSight connectors and their purposes
- Installing and configuring ArcSight connectors
- Managing connector updates and health
ArcSight ESM Management
- Navigating the ArcSight Console
- Managing users, groups, and permissions
- Configuring network and device resources
Correlation Rules and Security Monitoring
- Basics of correlation rules and their creation
- Deploying correlation rules for real-time threat detection
- Utilizing the dashboard for security monitoring
Reporting and Visualization
- Creating custom reports for security analytics
- Designing effective dashboards and visualizations
- Best practices for reporting and alerting
Active Lists, Session Lists, and Data Monitors
- Introduction to lists and data monitors in ArcSight
- Configuring and managing lists for dynamic threat detection
- Practical applications of data monitors
Tool Optimization
- Customizing dashboards for enhanced operational visibility
- Streamlining event streams for efficient monitoring and analysis
Advanced Variable Construction and Developing Lists and Rules
- Techniques for creating complex variables in ArcSight
- Using variables to filter and refine event data
- Developing and managing lists for dynamic event categorization
- Creating advanced rules for automated threat detection and response
Advanced Correlation Techniques and Search Methods
- Strategies for correlating disparate event data to uncover sophisticated threats
- Applying advanced correlation for real-world threat scenarios
- Leveraging ArcSight's search capabilities for deep-dive investigations and threat hunting
- Tips and tricks for constructing effective search queries
System Maintenance and Troubleshooting
- ArcSight ESM backup and restore procedures
- Monitoring system performance and troubleshooting common issues
- Best practices for ArcSight ESM maintenance
Summary and Next Steps
Requirements
- Basic knowledge of cybersecurity concepts and SIEM (Security Information and Event Management) fundamentals
- Prior experience with Micro Focus ArcSight ESM
Audience
- Security analysts
- Cybersecurity and IT professionals
Open Training Courses require 5+ participants.
Micro Focus ArcSight ESM Advanced Training Course - Booking
Micro Focus ArcSight ESM Advanced Training Course - Enquiry
Micro Focus ArcSight ESM Advanced - Consultancy Enquiry
Testimonials (1)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework focused on bank capital adequacy, stress testing, and market liquidity risk. Initially established by the Basel Committee on Banking Supervision in 2010–11, the implementation timeline for these amendments was extended until March 31, 2019. The framework enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowings. Rather than replacing its predecessors, it functions alongside Basel I and Basel II to create a more comprehensive regulatory environment.
Navigating this complex and evolving landscape can be challenging. Our course and training are designed to help you anticipate changes and understand their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality are current and highly effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Equip attendees with practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk management responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of Risk Management teams
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations covering market, credit, counterparty, and liquidity risk
- Stress testing for various risk measures, including formulation and delivery methods
- Potential effects of Basel III on the international banking industry, with practical application demonstrations
- Need for the new Basel norms
- Overview of the Basel III norms
- Objectives of the Basel III norms
- Timeline for Basel III implementation
CCTV Security
14 HoursThis instructor-led, live training in Romania (online or onsite) is designed for security managers who wish to develop basic to intermediate-level skills in CCTV security surveillance and management.
By the end of this training, participants will be able to:
- Identify various types of CCTV systems and understand their benefits and features.
- Grasp the requirements for cabling and setting up CCTV systems.
- Install, configure, and manage CCTV systems effectively.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Romania (online or onsite) is designed for advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
Upon completing this training, participants will be able to:
- Acquire comprehensive knowledge of fraud examination principles and processes.
- Identify, investigate, and prevent various forms of financial fraud.
- Understand the legal framework surrounding fraud, including its legal elements, applicable laws, and regulations.
- Develop practical skills for conducting fraud investigations, such as evidence collection, interviewing techniques, and data analysis.
- Design and implement effective fraud prevention and deterrence programs within organizations.
- Gain the confidence and knowledge necessary to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day training event (CGEIT preparation) serves as the ideal groundwork for exam day, designed to maximize your chances of passing the challenging CGEIT certification on your first try.
The CGEIT designation is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is specifically tailored for professionals tasked with managing IT governance or those holding significant advisory or assurance roles within the field.
Earning CGEIT status will broaden your professional recognition in the job market and enhance your influence at the executive level.
Objectives:
This seminar is structured to prepare delegates for the CGEIT examination by helping them expand their existing knowledge and understanding, ensuring they are well-equipped to pass the exam as outlined by ISACA.
Target Audience:
The course is intended for IT and business professionals with substantial experience in IT governance who are preparing to sit for the CGEIT exam.
CipherTrust Manager
21 HoursThis instructor-led, live training in Romania (online or on-site) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
CISM - Certified Information Security Manager
28 HoursDescription:
Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022.
CISM® represents the most prestigious and rigorous certification for Information Security Managers worldwide. This credential offers you the opportunity to join an elite network of peers who continuously learn and adapt to the evolving opportunities and challenges in Information Security Management.
Our CISM training methodology provides comprehensive coverage of the four CISM domains, with a clear focus on building foundational concepts and solving CISM exam questions released by ISACA. This course serves as intensive training and rigorous exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors encourage all attendees to review the ISACA-released CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. The QA&E is invaluable in helping candidates understand the style of ISACA questions, the approach to solving them, and facilitates rapid retention of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination.
Goal:
The ultimate goal is to pass your CISM examination on the first attempt.
Objectives:
- Apply the knowledge gained in a practical manner that benefits your organisation
- Establish and maintain an information security governance framework to achieve your organization's goals and objectives
- Manage information risk to an acceptable level to meet business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into the contracts and activities of third parties/ suppliers
- Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact
Target Audience:
- Security professionals with 3-5 years of front-line experience
- Information security managers or those with management responsibilities
- Information security staff and assurance providers who require an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, executive and operational managers responsible for assurance functions
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Romania (online or onsite) is designed for compliance professionals in the payment sector who aim to develop, implement, and enforce a robust compliance program within their organizations.
Upon completion of this training, participants will be equipped to:
- Comprehend the regulations established by government regulators for payment service providers.
- Develop the internal policies and procedures necessary to meet regulatory requirements.
- Establish a compliance program that aligns with applicable laws.
- Ensure that all corporate processes and procedures adhere to the compliance framework.
- Safeguard the company’s reputation while protecting it from legal liabilities.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led live training in Romania (online or onsite) targets intermediate-level cybersecurity professionals who aim to enhance their grasp of GRC frameworks and apply them to ensure secure and compliant business operations.
By the conclusion of this training, participants will be able to:
- Comprehend the fundamental elements of cybersecurity governance, risk, and compliance.
- Perform risk assessments and formulate effective risk mitigation strategies.
- Execute compliance measures and handle regulatory obligations.
- Create and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert overview of the newly enacted Accessibility Law, providing developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's importance and implications, the course rapidly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
This course aims to equip participants with a solid grasp of GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance initiatives.
Course Overview:
- Key GRC terminology and definitions
- Foundational principles of GRC
- Core components, best practices, and activities
- The relationship between GRC and related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO/IEC 27001 Lead Implementer
35 HoursThe landscape of information security threats and attacks is constantly evolving and becoming more sophisticated. The most effective defense strategy involves the proper implementation and management of information security controls and industry best practices. Furthermore, robust information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is designed to equip participants with the skills needed to implement an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and establish a framework for its ongoing management and enhancement.
Upon completing the training course, participants are eligible to sit for the exam. Successful candidates may apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which validates their ability and practical knowledge to implement an ISMS aligned with ISO/IEC 27001 requirements.
Who Can Attend?
- Project managers and consultants involved in or concerned with the implementation of an ISMS
- Expert advisors aiming to master the implementation of an ISMS
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team
General information
- Certification fees are included in the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate awarding 31 CPD (Continuing Professional Development) credits will be issued
- In case of exam failure, you can retake the exam within 12 months free of charge
Educational approach
- This training course contains essay-type exercises, multiple-choice quizzes, examples, and best practices used in the implementation of an ISMS.
- The participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes is similar to that of the certification exam.
Learning objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the operation of an information security management system and its processes based on ISO/IEC 27001
- Learn how to interpret and implement the requirements of ISO/IEC 27001 in the specific context of an organization
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management refers to the systematic oversight of the entire lifecycle of open-source components within an organization, ensuring their secure, compliant, and efficient utilization.
Delivered as an instructor-led, live training session (available online or onsite), this program targets intermediate-level IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this training, participants will be able to:
- Formulate effective OSS policies and establish robust governance frameworks.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Reduce risks linked to licensing issues and security vulnerabilities.
- Accelerate OSS adoption while maximizing innovation and achieving cost savings.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations using OSS management tools.
Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Romania (online or onsite) offers a personal certification for industry professionals who want to showcase their expertise and comprehension of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Grasp the payment process and the PCI standards established to safeguard it.
- Comprehend the roles and responsibilities of entities within the payment industry.
- Gain deep insight into and understanding of the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and its application to organizations involved in the transaction process.