Sentinel 7.1 Administration (Course 8337)

Provo, UT
Tuesday, September 30, 2014

Sentinel 7.1 Administration (Course 8337)

Tuesday, September 30, 2014 8:30 AM - Friday, October 03, 2014 5:00 PM (Mountain Time)

1800 South Novell Place
Provo, UT 84606
United States

Gary Porter
Start Your Registration


Course 8337

The purpose of this course is to teach the tasks required of a Sentinel 7 Administrator. Students will be able to describe the architecture, install collectors that capture events from various event sources, detect anomalies, and be able to run reports based on those collected events. What products or services are being covered? Sentinel 7 This course will deliver administration information and tasks required to manage a Sentinel Deployment After completing this course, students should be able to install and configure Sentinel 7 and collect events from various event sources. Students should also be able top perform tasks related to security and intelligence, data storage, and event searching and reporting.

Audience Summary

This course covers many aspects of the Novell Sentinel 7 product and its functionality. This course is appropriate for analysts who will be using the Sentinel console, administrators who will be managing the day-to-day upkeep, and developers who will be customizing Sentinel correlation rules, reports, or collectors. The course will provide a complete understanding of Sentinel features, ongoing administration, and introduce customization, network security, and troubleshooting concepts.

Course Prerequisites

This course covers a wide range of Novell Sentinel 7 functionality, from basic analyst training to custom collector development. There are no formal prerequisites, but to get full value from the class, you are encouraged to be familiar with basic concepts such as: Basic networking: IP protocol/CIDR notation, HTTP(s)/FTP and other protocols, bandwidth, VLANs, Network Address Translation, DHCP, DNS, LDAP Network security devices and operation: AV scanners, Intrusion Detection Systems, firewalls, vulnerability scanners, etc Basic security concepts: Identity/user/role management, access control, security policies, compliance and IT controls, incident response, encryption, reporting Common network threats: viruses, DOS attacks, information leaks, trojans/worms, buffer overflows, etc. Relational database concepts: tables, relationships and keys, joins, partitions, and so on Basic programming concepts: Iterative logic, Boolean logic, evaluations and operators, variables and parameters, data objects, regular expressions, ASCII/Hex encoding, file/network/process input/output, debugging

Interested in hosting your own event?Click here.
© 2016
Quick, easy and affordable online event registration and event management software for all event sizes.