StealthWatch for Security Operations: Course Description
Transcription
StealthWatch for Security Operations: Course Description
STEALTHWATCH FOR SECURITY OPERATIONS: COURSE DESCRIPTION 6.5 StealthWatch for Security Operations Available Q1 2015 Overview Once the StealthWatch® System is installed, and the initial configuration and basic setup of the system is complete, customers need to begin to use the system to monitor network activities. The two-day, StealthWatch for Security Operations course is designed for customers who are new to StealthWatch and have responsibilities such as assessing security needs, creating and enforcing security policy, security monitoring or security engineering. The course focuses on tuning the StealthWatch system through adding policies, optimizing alarms and host group management. It will also cover workflows for obtaining actionable alarms and incident response. Assumptions This course has a very specific focus on security operations. It assumes the StealthWatch System is installed, reachable and has completed the initial configuration and basic setup of the system. It also assumes all exporters have Flow data configured properly with exporters pointing to the appropriate FlowCollector. Course Prerequisites and Assumed Knowledge To have a successful learning experience, the following is assumed about your knowledge and experience: Basic understanding of TCP/IP and telemetry Working knowledge of networking technologies including knowledge of servers, routers, hosts and IP networks within your organization All students should have completed the following (minimum) prerequisites. These prerequisites are available as eLearning courses found in the Customer Training Center (LMS) available through Lancope’s Customer Community: 1 Flow Basics StealthWatch Overview and Components StealthWatch SMC Client Interface Overview StealthWatch Web App Overview STEALTHWATCH FOR SECURITY OPERATIONS: COURSE DESCRIPTION Course Structure The course can be categorized in the following major concept areas: Course Outline Technical Overview 2 Technical Concepts o NetFlow and Limitations of NetFlow Deduplication Flow Stitching NAT Stitching Client / Server issue o What SW Does Behavior Analysis Anomaly based vs signature based o How SW Works Flow & Visibility STEALTHWATCH FOR SECURITY OPERATIONS: COURSE DESCRIPTION o Base-lining Using StealthWatch o Appliance Administration Interfaces o The SMC Client Tuning the System 3 Defining Host Groups Understanding Default Policy Using Host Groups By Function Using the Catch All Host Group Quieting the system o Suppress Alarms o Raising Thresholds Posturing the system o Adding Policy o Lowering Thresholds o Creating Host Rules Understanding / Viewing Traffic o Identify documents/reports/tools you use to help you identify what IP space your organization owns. Defining Services and Applications o What is a Service o Ports and Protocols o Defining Services o What is an application o Why Define Applications o Default applications o Host Group Application Traffic Document o Investigating Undefined Applications Viewing Traffic from Undefined Sources Defining the By Function Host Group o Need this to understand devices that naturally create a lot of noise on the network. o Reducing False Positives Policy Management o Role Policy o Host Policy How Policies are Applied o Inside Hosts vs Outside Hosts STEALTHWATCH FOR SECURITY OPERATIONS: COURSE DESCRIPTION Incident Response Putting Together an incident response process Example Workflow for Incident Response o Working with alarms o Identifying False Positives Place in the Customer Success Maturity Model Lancope’s Customer Success model consists of four stages of enablement as shown below. Each stage has multiple phases. For purposes of this introduction, the goal is to present where in the customer success maturity model this StealthWatch for Security Operations (SecOps) course supports enablement. Implementation Visibility Threat Detection System Integration SecOps (SSO) Course Pricing This course is available as a Virtual Instructor-Led (VILT) course. It can be delivered to a customer as a 2-day private training course. Contact Lancope sales team for additional pricing information. Need More Information? Contact Lancope Learning and Development team at [email protected]. 4