Micro Focus ArcSight ESM Advanced Training Course
Micro Focus ArcSight ESM (Enterprise Security Manager) is a robust Security Information and Event Management (SIEM) solution engineered to assist organizations in the real-time detection, analysis, and response to cybersecurity threats and incidents.
This instructor-led, live training (available online or onsite) targets advanced-level security analysts looking to enhance their proficiency with advanced Micro Focus ArcSight ESM capabilities. The course aims to strengthen an organization’s capacity to detect, respond to, and mitigate cyber threats with increased accuracy and efficiency.
Upon completion of this training, participants will be equipped to:
- Leverage Micro Focus ArcSight ESM to improve monitoring and threat detection effectiveness.
- Build and manage sophisticated ArcSight variables to optimize event streams for precise analysis.
- Create and implement ArcSight lists and rules to facilitate effective event correlation and alerting.
- Utilize advanced correlation techniques to identify intricate threat patterns and minimize false positives.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request tailored training for this course, please contact us to arrange your schedule.
Course Outline
Introduction to ArcSight ESM
- Overview of SIEM and ArcSight ESM
- Understanding the ArcSight ESM architecture
Configuring ArcSight Connectors
- Types of ArcSight connectors and their purposes
- Installing and configuring ArcSight connectors
- Managing connector updates and health
ArcSight ESM Management
- Navigating the ArcSight Console
- Managing users, groups, and permissions
- Configuring network and device resources
Correlation Rules and Security Monitoring
- Basics of correlation rules and their creation
- Deploying correlation rules for real-time threat detection
- Utilizing the dashboard for security monitoring
Reporting and Visualization
- Creating custom reports for security analytics
- Designing effective dashboards and visualizations
- Best practices for reporting and alerting
Active Lists, Session Lists, and Data Monitors
- Introduction to lists and data monitors in ArcSight
- Configuring and managing lists for dynamic threat detection
- Practical applications of data monitors
Tool Optimization
- Customizing dashboards for enhanced operational visibility
- Streamlining event streams for efficient monitoring and analysis
Advanced Variable Construction and Developing Lists and Rules
- Techniques for creating complex variables in ArcSight
- Using variables to filter and refine event data
- Developing and managing lists for dynamic event categorization
- Creating advanced rules for automated threat detection and response
Advanced Correlation Techniques and Search Methods
- Strategies for correlating disparate event data to uncover sophisticated threats
- Applying advanced correlation for real-world threat scenarios
- Leveraging ArcSight's search capabilities for deep-dive investigations and threat hunting
- Tips and tricks for constructing effective search queries
System Maintenance and Troubleshooting
- ArcSight ESM backup and restore procedures
- Monitoring system performance and troubleshooting common issues
- Best practices for ArcSight ESM maintenance
Summary and Next Steps
Requirements
- Foundational knowledge of cybersecurity principles and SIEM (Security Information and Event Management) fundamentals
- Previous experience working with Micro Focus ArcSight ESM
Target Audience
- Security analysts
- Cybersecurity and IT professionals
Open Training Courses require 5+ participants.
Micro Focus ArcSight ESM Advanced Training Course - Booking
Micro Focus ArcSight ESM Advanced Training Course - Enquiry
Micro Focus ArcSight ESM Advanced - Consultancy Enquiry
Testimonials (1)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
Upcoming Courses
Related Courses
AML OFFICER MASTERCLASS
21 HoursGlobal efforts to combat money laundering place a significant emphasis on coordinated international standards. Compliance officers, AML Officers, MLROs, KYC analysts, Auditors, and Managers must understand how to ensure adherence to Subsidiary 373.01, the Prevention of Money Laundering and Funding of Terrorism Regulations (PMLFTR).
Under the PMLFTR, all Subject Persons, including those operating within the regulated financial services sector, are mandated to appoint a Money Laundering Reporting Officer (MLRO).
This practical course provides essential knowledge and targeted guidance on implementing AML compliance within your organization, with particular focus on the regulatory landscape in Malta.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework concerning bank capital adequacy, stress testing, and market liquidity risk. Originally established by the Basel Committee on Banking Supervision in 2010–2011, the implementation timeline for the Accord has been extended to March 31, 2019. This framework enhances bank capital requirements by boosting liquidity and reducing leverage. Unlike Basel I and II, Basel III mandates distinct reserve levels for various deposit types and borrowing categories, working in conjunction with rather than replacing its predecessors. Navigating this complex and evolving regulatory landscape can be challenging; our comprehensive course and training program are designed to help you anticipate changes and manage their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our educational materials and training quality are current, effective, and highly suitable.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Define practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk-related responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations covering market, credit, counterparty, and liquidity risk
- Stress testing methodologies for various risk measures, including formulation and delivery
- The anticipated impact of Basel III on the international banking industry, featuring practical application demonstrations
- The rationale behind the new Basel Norms
- Overview of the Basel III Norms
- Objectives of the Basel III Norms
- Basel III Timeline
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Slovakia (online or in-person) is designed for advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day CGEIT training course serves as comprehensive preparation for the examination, designed to equip you with the skills necessary to successfully pass the challenging CGEIT exam on your first try.
The CGEIT qualification is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is tailored for professionals who manage IT governance or hold significant advisory or assurance responsibilities in this domain.
Earning CGEIT status enhances your market recognition and increases your influence at the executive level.
Objectives:
This seminar aims to prepare delegates for the CGEIT examination by supplementing their existing knowledge and understanding, enabling them to meet the standards defined by ISACA and better prepare to pass the exam.
Target Audience:
Our training course is intended for IT and business professionals with substantial IT governance experience who are preparing for the CGEIT exam.
COBIT 2019 Foundation
21 HoursLearning Objectives
The COBIT 2019 Foundation course serves as an introductory guide to the COBIT 2019 framework. It equips learners with the knowledge to leverage an integrated business framework for the governance and management of enterprise IT, thereby achieving IT-business alignment, reducing costs, and enhancing productivity. The course curriculum addresses the following key areas:
- Introduction to the new framework
- Essential concepts and terminology
- Principles of governance and framework application
- Structure and components of a governance system
- Objectives for governance and management
- Strategies for performance management
- Methods for designing a customized governance system
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Slovakia (offered online or onsite) is tailored for compliance professionals in the payment services industry who wish to develop, implement, and enforce a compliance program within their organizations.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for intermediate-level cybersecurity professionals who want to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers an expert-level introduction to the recently enacted Accessibility Law, empowering developers with the practical skills needed to design, develop, and maintain fully accessible applications. Beginning with a contextual discussion on the importance and implications of the law, the curriculum quickly transitions to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
Ensure that participants develop a solid foundation in GRC processes and capabilities, along with the necessary skills to effectively integrate governance, performance management, risk management, internal control, and compliance activities.
Course Overview:
- Key GRC terminology and definitions
- Core principles of GRC
- Essential components, practices, and activities
- Integration of GRC with related disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training is designed to equip you with the essential expertise and knowledge required to assist an organization in implementing and managing Information Security controls, as outlined in ISO/IEC 27002.
Upon completing this course, you will be eligible to take the examination and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. This PECB Lead Manager Certification validates that you have mastered the principles and techniques necessary for implementing and managing Information Security Controls in accordance with ISO/IEC 27002.
Target Audience
- Managers or consultants aiming to implement an Information Security Management System (ISMS) aligned with ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the ISMS implementation process
- Professionals responsible for information security, compliance, risk, and governance within an organization
- Members of information security teams
- IT expert advisors
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs, and CISOs
Learning Objectives
- Gain mastery in implementing Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Develop a comprehensive understanding of the concepts, approaches, standards, methods, and techniques required for the effective implementation and management of Information Security controls
- Understand the interrelationships between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Recognize the critical role of information security in organizational strategy
- Acquire proficiency in implementing information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational Approach
- This training integrates both theoretical foundations and practical applications
- Lectures supplemented with examples drawn from real-world scenarios
- Hands-on exercises based on case studies
- Review sessions to support exam preparation
- Practice tests modeled after the certification examination
General Information
- Certification fees are included in the exam price
- Participants will receive training materials containing over 500 pages of information and practical examples
- A participation certificate awarding 31 CPD (Continuing Professional Development) credits will be issued
- In the event of an unsuccessful exam attempt, candidates may retake the exam free of charge within 12 months
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all employees seeking a practical grasp of Compliance principles and effective Risk Management techniques.
Course Format
The training utilizes a blended learning approach, featuring:
- Guided discussions
- Slide-based presentations
- Case studies
- Real-world examples
Course Objectives
Upon completion, participants will be able to:
Gain a thorough understanding of the essential aspects of Compliance, alongside national and international initiatives designed to manage related risks.
Articulate how organizations and their teams can establish an effective Compliance Risk Management Framework.
Define the responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and comprehend how these roles are integrated into the business structure.
Recognize critical risk areas within Financial Crime, particularly concerning international operations, offshore centers, and high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves overseeing the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
Delivered as an instructor-led live training session (available online or onsite), this program targets intermediate IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion, participants will be equipped to:
- Develop effective OSS policies and governance frameworks.
- Leverage Software Bill of Materials (SBOM) and Software Composition Analysis (SCA) tools to identify, track, and manage open-source dependencies.
- Mitigate risks related to licensing issues and security vulnerabilities.
- Facilitate OSS adoption to maximize innovation and cost savings.
Course Format
- Interactive lectures and group discussions.
- Case studies and scenario-based exercises.
- Hands-on demonstrations using OSS management tools.
Customization Options
- This course can be customized to align with your organization's specific OSS policies and toolchains. Please contact us to arrange tailored sessions.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Slovakia (online or onsite) offers a personal certification for industry practitioners seeking to validate their professional expertise and comprehensive understanding of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Comprehend the payment process and the PCI standards established to safeguard it.
- Recognize the roles and responsibilities of entities operating within the payment industry.
- Gain deep insight into and a thorough understanding of the 12 PCI DSS requirements.
- Demonstrate proficiency in PCI DSS and its application to organizations involved in transaction processes.
Secrets of Boardroom Leadership
7 HoursThe quality of an organization's governance depends directly on its board of directors, which in turn relies on the effectiveness of its chairman. Despite this critical importance, the role of board leadership receives the least amount of training and support. Furthermore, board leaders and chief executives too often find themselves locked in power struggles. This program reveals the secrets used by the world's top board leaders, offering practical, real-world insights from experienced board professionals.