Net og komm sikkerhed
Softwaresikkerhed
Systemsikkerhed
Netværkspenetrationstest
SIEM and log analysis
System integration
Security in Web Development
Lektionsplan
Valgfrit modul VF4 SIEM og log-analyse (5 ECTS)

Lektionsplan

Fagets titel: VF4 SIEM og log-analyse (5 ECTS)

English: SIEM and Log Analysis
Teacher: Henrik Kramselund Jereminsen [email protected] +45 2026 6000
This document is written in markdown, uploadet to GitHub and then processed by Gitbook.
The link for this is: https://zencurity.gitbook.io/kea-it-sikkerhed/siem-og-loganalyse/lektionsplan

Goals

The module is centered around Security information and event management (SIEM) and log analysis including common SIEM systems, logging, gathering, processing and working with logs.
Teaching material will primarily be English, but the teaching will be in Danish.
See more about the course in the official curriculum which can be downloaded from the main page https://kompetence.kea.dk/uddannelser/it-digitalt/diplom-i-it-sikkerhed
  • near the top "Download studieordningen".

Exam:

Date 6/1 2022

Teaching Methods:

  • Lecture lessons
  • Group exercises and cases, including practical exercises with laptop
Teaching dates: 30/11 2021, 2/12 2021, 7/12 2021, 9/12 2021, 13/12 2021, 16/12 2021, 21/12 2021
Note: CHANGE of date 13/12 is a monday, changed from tuesday!
Make sure to mark dates in your calendar - some weeks will have lessons tuesday/thursdays, some weeks will have three days in a row - tuesday, wednesday, thursday.

Hardware

Since we are going to be doing exercises, each team will need virtual machines.
The following are recommended:
  • One based on Debian 11, running software servers and web applications
Read more about these at https://github.com/kramse/kramse-labs

Course reading list

This course uses three books and a number of supporting resources.
Primary literature:
  • Data-Driven Security: Analysis, Visualization and Dashboards Jay Jacobs, Bob Rudis ISBN: 978-1-118-79372-5 February 2014 https://datadrivensecurity.info/ - short DDS
  • Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan by Jeff Bollinger, Brandon Enright, and Matthew Valites ISBN: 9781491949405 - short CIP
  • Intelligence-Driven Incident Response Scott Roberts ISBN: 9781491934944 - short IDI
  • Security Operations Center: Building, Operating, and Maintaining your SOC ISBN: 9780134052014 Joseph Muniz - short SOC
It is recommended to buy these books.
Also the course will use internet links and pages. These can be downloaded from the internet often for free and may be gathered by the instructor for easy download.
Supporting literature:
  • Linux Basics for Hackers Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb, December 2018, 248 pp. ISBN-13: 978-1-59327-855-7 - shortened LBfH
This book introduces the Linux operating system commands, using Kali Linux as example. The tools presented include a lot of generic Unix tools. If you have no experience with Linux or Unix it is recommended to buy this book.
Installing and running the specific Linux distributions used is described in these books
In the Network and Communications Security course we use this book:
  • Applied Network Security Monitoring Collection, Detection, and Analysis, 2014 Chris Sanders ISBN: 9780124172081 -- I highly recommend this book

Supporting Internet resources

Apart from the books a lot of blogs, papers and other resources are available. Often these can be downloaded from the internet.
Other relevant papers and documents can often be found in the NIST publications, Special Publications series 800: https://csrc.nist.gov/publications/sp800 Example the Guide to Computer Security Log Management https://csrc.nist.gov/publications/sp800

Planning

The detailed plan is below with a table summarizing lessons.
Note: might contain lot of pages, learn to skim and skip chapters and parts that don't interest you. In real life we don't have time to read every word!
Also I have decided to include very few papers in this course. Remember to check references in the books for supplementary reading.
Week
Theme / Goals
Litterature / Preparation
30/11 2021
Welcome, goals and expectations
Prepare Virtual Machines - bring laptop
Create a good starting point for learning Introduce lecturer and students Concrete Expectations Prepare tools for the exercises
Reviewing the literature list will occur when we meet.
Download resources
Identification of chapters from books for reading as home assignment
Start lab setup and asses programming knowledge
2/12 2021
Initial Overview of SIEM Terms
Get an overview of the subject
Books: approx 61 pages without the skim part, lots of pictures
DDS 1. The Journey to Data-Driven Security 18
DDS 2. Building Your Analytics Toolbox: R and Python 17
CIP 1 Incident Response Fundamentals 13
CIP 2 What Are You Trying to Protect? 13
Skim CIP 3 What Are the Threats? 14
7/12 2021
Hello world of Security Data Analysis
Get started with some data types and sources
Books: about 61 pages, lots of pictures
DDS 3. Learning the "Hello World" of Security Data Analysis 31
DDS 4. Performing Exploratory Security Data Analysis 30
Do exercises if you feel like it, notice how small valuable programs can be
9/12 2021
Storing and Processing data
Books: 23 pages, but also parts of CIP 7!
CIP 4 A Data-Centric Approach to Security Monitoring 23
Skim read: CIP 7 Tools of the Trade 57, need to know NetFlow, DNS, and HTTP proxy logs in the real-world
Skim read: DDS 8. Breaking Up with Your Relational Database 25
13/12 2021
Visualization
Books - approx 44 pages
DDS 6. Visualizing Security Data 22, DDS 10. Designing Effective Security Dashboards 22
Skim: DDS 11. Building Interactive Security Visualizations 26
16/12 2021
Baseline Your Data
Books - approx 64 pages
DDS 7. Learning from Security Breaches VERIS 28
DDS 12. Moving Toward Data-Driven Security 11
IDIR 1. Introduction 8
IDIR 2. Basics of Intelligence 17
21/12 2021
Operate, Respond and Forensics
Books - approx 68 pages
SOC 7. vuln management 25, SOC 11. Reacting to events and Incidents 16, CIP 6 Operationalize! 27
Papers: Skim table of contents Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, ENISA

Skipped chapters

We are reading mostly from the DDS book, but we are also skipping a few chapters.
We are skipping these: DDS 5. From Maps to Regression 33 pages - skipped, as Elasticsearch provides the math we need.
DDS 9. Demystifying Machine Learning 25 pages - skipped, as this is complex subject in itself.
Note: a recent book was published about this subject: Machine Learning and Security Clarence Chio ISBN: 9781491979907
We also skipped other chapters, which I would have liked to include:
  • SOC 1. Introduction to Security Operations and the SOC 33 pages
  • SOC 2. Overview of SOC Technologies 32 pages
  • SOC 6. Security Event Generation and Collection 66 pages
I have tried to include important conclusions from those chapters in the slides.
Last modified 1mo ago