Bata Mladen
Ctrlk
HomeNotesWrite-Up'sBookshelfArticles
  • Intro
  • ⚙️SERVICES
    • DNS
    • Oracle TNS
    • FTP
    • SMB
    • Routing Protocols
    • MariaDB/MySQL
  • 👨‍💻PROGRAMMING
    • Java
    • Python
    • Assembly
  • 🔐CRYPTOGRAPHY
    • Cryptography Intro
    • Encryption Algorithm
    • Hash Functions
    • Digital Signatures
  • 🛡️SECURITY CONCEPTS
    • Security Basics
    • Threads and Vulnerabilities
    • Network Security
    • Certificates
  • 👓PRIVACY
    • Password Manager
    • Drive
    • Browser
    • VPN
    • Messengers
    • Temporary Mails
    • Online Payments
    • Deleting Files
  • 🔍DIGITAL FORENSICS
    • Introduction
    • Digital Forensics Investigation Process
    • Computer Forensic Fundamentals
    • Investigation Process
    • Incident Response
    • Data Acquisition & Evidence Collection
    • Email Investigation
    • Dark Web Forensic
    • Defeating Anti-Forensic Techniques
    • OSINT
  • 📜CERTIFICATES
    • CPTS
    • CDSA
      • Module 1 - Incident Handling
      • Module 2 - Security Monitoring & SIEM Fundamentals
        • SIEM definition & Fundamentals
        • Elastic Stack
        • SOC
        • MITTRE ATT&CK
        • SIEM visualization (5-8)
        • The Triaging Process
      • Module 3 - Windows Events & Finding Evil
      • Module 4 - Threat Hunting
      • Module 5 - Understanding Log Sources and Investigating With Splunk
      • Module 6 - Active Directory
  • 🤖MACHINE LEARNING
    • Learning Algorythm Types
    • Data Exploration
    • Data Pre-Processing
    • Training & Testing Data
    • Feature engineering
    • ML techniques
    • Anomaly Detection
    • Classification Raport
  • 🐧LINUX
    • Basic Linux Commands
    • SQL
    • Managing Users & Groups
  • 💻COMPUTER CONCEPTS
    • File Systems
    • Metadata
    • ISA
  • ⚙️Reverse Engineering
    • Intro
  • 🦠Malware Analysis
    • Soon..
Powered by GitBook
On this page
  1. 📜CERTIFICATES
  2. CDSA

Module 2 - Security Monitoring & SIEM Fundamentals

SIEM definition & FundamentalsElastic StackSOCMITTRE ATT&CKSIEM visualization (5-8)The Triaging Process
PreviousDetection & Analysis Stage (Part 2)NextSIEM definition & Fundamentals