Red BundiTM provides you with hands on practice with the tools you will be using to defend an organization against systems and network attacks. The course will improve your knowledge and understanding of the TCP/IP based protocols to better equip you to perform effective analysis of intrusion attempts and investigations. The emphasis of this
course is to help you develop the fundamental competences to be able to perform network traffic analysis, configure intrusion detection and prevention systems, and ultimately keep them up to date with effective signatures and rules to match new attacks.
Black BundiTM is a course developed for those professionals who need to manage and secure a corporate environment. The course builds on the skills and competences acquired with Red BundiTM and teaches you how to deploy, configure and operate intrusions detection and prevention systems in a corporate IT infrastructure where you are required to deal with potentially thousands of security events daily. In this course you will learn how to use large scale monitoring systems to keep track of a corporate IT infrastructure and how to operate and customize Security Information and Event Management (SIEM) systems to effectively correlate security events and act upon them in a timely manner
Red ChunguTM addresses the challenges faced by modern organizations with regards to Log Management in order to comply with business requirements, as well as the requirements imposed by the law, regulations and contractual obligations. A typical organization will have devices, computer systems and applications generating thousands of logs daily, each with specific requirements which must be met. In this course the student will work through a practical case study following a top-down approach to log management, starting from the requirements analysis down to the choice, deployment and configuration of log management tools and solutions.