Micro Focus ArcSight ESM Advanced Training Course
Micro Focus ArcSight ESM (Enterprise Security Manager) is a robust security information and event management (SIEM) platform engineered to assist organizations in detecting, analyzing, and responding to cybersecurity threats and incidents in real time.
This instructor-led, live training session (available online or on-site) is designed for advanced-level security analysts aiming to enhance their proficiency in leveraging advanced Micro Focus ArcSight ESM capabilities. The goal is to strengthen an organization’s capacity to detect, respond to, and mitigate cyber threats with increased precision and speed.
Upon completing this training, participants will be able to:
- Maximize the effectiveness of Micro Focus ArcSight ESM to bolster monitoring and threat detection functions.
- Build and manage advanced ArcSight variables to refine event streams for more accurate analysis.
- Design and deploy ArcSight lists and rules to facilitate effective event correlation and alerting.
- Employ advanced correlation techniques to identify complex threat patterns and minimize false positives.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request customized training for this course, please reach out to us to make arrangements.
Course Outline
Introduction to ArcSight ESM
- Overview of SIEM and ArcSight ESM
- Understanding the ArcSight ESM architecture
Configuring ArcSight Connectors
- Types of ArcSight connectors and their purposes
- Installing and configuring ArcSight connectors
- Managing connector updates and health
ArcSight ESM Management
- Navigating the ArcSight Console
- Managing users, groups, and permissions
- Configuring network and device resources
Correlation Rules and Security Monitoring
- Basics of correlation rules and their creation
- Deploying correlation rules for real-time threat detection
- Utilizing the dashboard for security monitoring
Reporting and Visualization
- Creating custom reports for security analytics
- Designing effective dashboards and visualizations
- Best practices for reporting and alerting
Active Lists, Session Lists, and Data Monitors
- Introduction to lists and data monitors in ArcSight
- Configuring and managing lists for dynamic threat detection
- Practical applications of data monitors
Tool Optimization
- Customizing dashboards for enhanced operational visibility
- Streamlining event streams for efficient monitoring and analysis
Advanced Variable Construction and Developing Lists and Rules
- Techniques for creating complex variables in ArcSight
- Using variables to filter and refine event data
- Developing and managing lists for dynamic event categorization
- Creating advanced rules for automated threat detection and response
Advanced Correlation Techniques and Search Methods
- Strategies for correlating disparate event data to uncover sophisticated threats
- Applying advanced correlation for real-world threat scenarios
- Leveraging ArcSight's search capabilities for deep-dive investigations and threat hunting
- Tips and tricks for constructing effective search queries
System Maintenance and Troubleshooting
- ArcSight ESM backup and restore procedures
- Monitoring system performance and troubleshooting common issues
- Best practices for ArcSight ESM maintenance
Summary and Next Steps
Requirements
- Fundamental understanding of cybersecurity concepts and SIEM (Security Information and Event Management) principles
- Previous experience with Micro Focus ArcSight ESM
Audience
- Security analysts
- Cybersecurity and IT professionals
Open Training Courses require 5+ participants.
Micro Focus ArcSight ESM Advanced Training Course - Booking
Micro Focus ArcSight ESM Advanced Training Course - Enquiry
NobleProg offers professional training programs designed specifically for companies and organizations. These trainings are not intended for individuals.
Micro Focus ArcSight ESM Advanced - Consultancy Enquiry
Testimonials (1)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
Upcoming Courses
Related Courses
AI and IT Audit
14 HoursThis instructor-led, live training in France (online or onsite) is designed for intermediate-level IT auditors seeking to effectively incorporate AI tools into their audit practices.
Upon completion of this training, participants will be able to:
- Understand the fundamental concepts of artificial intelligence and their application within IT auditing contexts.
- Leverage AI technologies—including machine learning, natural language processing (NLP), and robotic process automation (RPA)—to enhance the efficiency, accuracy, and scope of audits.
- Conduct risk assessments using AI tools, facilitating continuous monitoring and proactive risk management.
- Incorporate AI into audit planning, execution, and reporting stages, thereby improving the overall effectiveness of IT audits.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework addressing bank capital adequacy, stress testing, and market liquidity risk. Originally established by the Basel Committee on Banking Supervision in 2010–11, the Accord’s implementation timeline has been extended to March 31, 2019. Basel III enhances bank capital requirements by boosting liquidity and reducing leverage.
Unlike Basel I & II, Basel III mandates different reserve levels for various deposit types and borrowings, working in tandem with rather than replacing its predecessors.
Navigating this complex, evolving landscape can be challenging. Our course and training support helps you manage anticipated changes and their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our materials and training quality remain current and effective.
Objectives:
- Prepare for the Certified Basel Professional Examination.
- Define hands-on strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within a banking organization.
Target Audience:
- Board members with risk responsibilities
- CROs and Heads of Risk Management
- Members of the Risk Management team
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations for market, credit, counterparty, and liquidity risk
- Stress testing for various risk measures, including how to formulate and deliver stress tests
- The likely effects of Basel III on the international banking industry, including demonstrations of its practical application
- Need for the new Basel norms
- The Basel III norms
- Objectives of the Basel III norms
- Basel III timeline
CCTV Security
14 HoursThis instructor-led, live training in France (online or onsite) is designed for security managers wishing to learn basic to intermediate-level CCTV security surveillance and management skills.
By the end of this training, participants will be able to:
- Familiarize themselves with the types of CCTV systems and understand their benefits and features.
- Understand the requirements for cabling and setting up CCTV systems.
- Install, configure, and manage CCTV systems.
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in France (online or on-site) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four-day event (CGEIT training) serves as the ultimate preparation for the exam period. It is specifically designed to ensure that you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is intended for professionals who are responsible for managing IT governance or who hold significant advisory or assurance responsibilities regarding IT governance.
Earning CGEIT status will provide you with broader recognition in the marketplace, as well as increased influence at the executive level.
Objectives:
This seminar has been designed to prepare delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding, thereby better preparing them to pass the exam as defined by ISACA.
Target Audience:
Our training course is intended for IT and business professionals who possess significant IT governance experience and are undertaking the CGEIT exam.
CipherTrust Manager
21 HoursThis instructor-led live training in France (available online or onsite) is intended for IT professionals who want to gain a thorough understanding of how to utilize the CipherTrust solution suite.
By the end of this training, participants will be able to:
- Comprehend the CipherTrust solution and its core functionalities.
- Evaluate device architecture and deployment models.
- Effectively manage the CipherTrust product suite.
CISM - Certified Information Security Manager
28 HoursDescription:
Please note that the updated CISM exam content outline applies to all examinations commencing on June 1, 2022.
CISM® stands as the most prestigious and rigorous qualification for Information Security Managers worldwide. Earning this credential grants you access to an elite peer network, enabling you to continuously learn and adapt to the expanding opportunities and challenges within Information Security Management.
Our CISM training methodology offers comprehensive coverage of all four CISM domains, with a strong emphasis on conceptual understanding and solving practice questions released by ISACA. This course provides intensive training and thorough exam preparation for the ISACA’s Certified Information Security Manager (CISM®) Examination.
Our instructors recommend that all participants review the ISACA released CISM QA&E (Questions, Answers, and Explanations) as part of their exam preparation. This resource is invaluable for helping participants understand the style of ISACA questions, the approach required to solve them, and for facilitating rapid assimilation of CISM concepts during live classroom sessions.
All our trainers possess extensive experience in delivering CISM training. We are committed to thoroughly preparing you for the CISM examination.
Goal:
The primary objective is to help you pass your CISM examination on the first attempt.
Objectives:
- Apply acquired knowledge in a practical manner to benefit your organization
- Establish and maintain an information security governance framework to achieve your organization's goals and objectives
- Manage information risk to an acceptable level to meet business and compliance requirements
- Establish and maintain information security architectures encompassing people, processes, and technology
- Integrate information security requirements into third-party and supplier contracts and activities
- Plan, establish, and manage the capability to detect, investigate, respond to, and recover from information security incidents to minimize business impact
Target Audience:
- Security professionals with 3-5 years of frontline experience
- Information security managers or individuals with management responsibilities
- Information security staff and assurance providers requiring an in-depth understanding of information security management, including: CISOs, CIOs, CSOs, privacy officers, risk managers, security auditors, compliance personnel, BCP/DR personnel, and executive and operational managers responsible for assurance functions
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in France (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led live training in France (online or onsite) targets intermediate-level cybersecurity professionals seeking to expand their understanding of GRC frameworks and apply them to ensure secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert introduction to the newly enacted Accessibility Law, empowering developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the law's significance and implications, the curriculum quickly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse goal:
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
- Essential terminology and definitions
- Fundamental principles of GRC
- Core components, practices, and activities
- The relationship between GRC and other disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in France (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all employees seeking a practical grasp of Compliance and effective Risk Management.
Course Format
Training is delivered via a blended learning approach, incorporating:
- Facilitated group discussions
- Slide-based presentations
- Case study analysis
- Real-world examples
Course Objectives
Upon completion, participants will be able to:
Gain a robust understanding of the core principles of Compliance, alongside national and international initiatives designed to manage associated risks.
Articulate how organizations and their teams can establish a robust Compliance Risk Management Framework.
Define the responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and understand how these roles function within a broader business structure.
Identify critical risk areas within Financial Crime, particularly concerning international operations, offshore centers, and high-net-worth individuals.
Open Source Software (OSS) Management
14 HoursManaging Open Source Software (OSS) involves overseeing the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
This instructor-led live training, available online or on-site, is designed for intermediate IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completing this training, participants will be capable of:
- Developing effective OSS policies and governance frameworks.
- Utilizing Software Bill of Materials (SBOM) and Software Composition Analysis (SCA) tools to identify, track, and manage open-source dependencies.
- Reducing risks related to licensing and security vulnerabilities.
- Accelerating OSS adoption to maximize innovation and cost efficiencies.
Course Format
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations using OSS management tools.
Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us to arrange.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in France (online or onsite) offers a professional qualification for industry practitioners seeking to demonstrate their expertise and understanding of the PCI Data Security Standard (PCI DSS).
Upon completing this training, participants will be able to:
- Grasp the payment process and the PCI standards established to safeguard it.
- Comprehend the roles and responsibilities of entities within the payment industry.
- Gain deep insight into the 12 requirements of PCI DSS.
- Apply knowledge of PCI DSS to organizations involved in the transaction process.