Basics of SIEM
What is SIEM
Functions of SIEM
Components of SIEM
Event correlation in SIEM
Real-time security monitoring
Cyber threat intelligence
Next-generation SIEM
AI-driven SIEM
Log management
Types of logs in SIEM
Log collection and processing
Log archival
Log analysis
Log forensics
What is threat intelligence?
IT security auditing
IT compliance management
Cloud security
Cloud security monitoring
Shadow IT detection and control
CASB
UEBA
What is UEBA?
Using AI and ML
Risk scoring
User identity Mapping
Incident management
Common cybersecurity incidents
Incident management
Incident detection
Incident resolution
SOC
What is SOC?
Components of SOC
SOC tools & technologies
Role of SOC
SOC best practices
What is SOC as a service
Other relavant explainers