Thank you so much for this video. So many other videos on SIEM are only about 5 minutes long. This is the perfect amount of depth for a beginner to start their own research.
Just for discussions sake I think SIEM originated from log management + security events filtering. Things like event correlation between desperate log sources was later on added on top to provide contextual information as needed.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you. IDS: Detects the malicious behaviour. IPS: Blocks the malicious behaviour. SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Aggregation Screen (Time Frame 8:09) is bit confusing for the beginners as you used parsing term also . I felt this could have been presented in a better way .
Log is a record of any activity happened on any system. For example, a web server will keep logs (record) of all requests received or a windows server keep logs of all logins and log offs.
Thank you so much for this video. So many other videos on SIEM are only about 5 minutes long. This is the perfect amount of depth for a beginner to start their own research.
Glad it was helpful!
Awesome video, keep it up and let us know once next Video on this topic released
Thumbs UP! Very good explanation.
Glad it was helpful!
Just for discussions sake I think SIEM originated from log management + security events filtering. Things like event correlation between desperate log sources was later on added on top to provide contextual information as needed.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you.
IDS: Detects the malicious behaviour.
IPS: Blocks the malicious behaviour.
SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Thanks. Nice Presentation. Informative.
Watching this before an interview
Best of luck :) let us know how did it go.
Amazing video. Superb narration. 👍👍
Hi, good effort. Please keep it going.
if possible pls make vidoes abt diff between ibm qradar,azure sential,sentialone,arcsight,logrthym,dnif,splunk,sumologic
Did you got any article or any videos which talks about different capabilities of each solutions which you have mentioned above?
Aggregation Screen (Time Frame 8:09) is bit confusing for the beginners as you used parsing term also . I felt this could have been presented in a better way .
Thank you @Sesha, we will incorporate your feedback in upcoming videos.
very nice explanation
Thanks buddy really helpful
Very good video, thank you
Thanks for this video 🙏
Can we get the documents for study purpose ?
I am working on it and will try to make them available as soon as possible.
👍thanks for excellent presentation
Can you pls do on IBM Qradar tool?
Yes, sure
Can you pls make a video of vapt.
can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc
Nice presentation, can u please upload video for SOAR
Yes definitely, we will bring a video for SOAR for you. Stay tuned.
ua-cam.com/video/9RdZRuY_7-Q/v-deo.html (Video for SOAR :) )
Nice try to explaining about them. But need more clarification on everything
Nice video sir
Thanks
can you perfectly sort out your soc playlist ?
Hello @Kaushalpurani5108,
Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :)
Regards
@@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship
@@Batmanop17 email us at connect@relativesecurity.com
Log sorce means?
Log source would be any device from where you are getting the logs. For example, it could be your Active Directory, Database or a firewall.
Is there any one who can build SIEM project for me in paid
Email @ connect@relativesecurity.com your requirements.
📻
What is log
Log is a record of any activity happened on any system. For example, a web server will keep logs (record) of all requests received or a windows server keep logs of all logins and log offs.
+