Course Outline

Foundations of Detection Engineering for Government

  • Core Concepts and Responsibilities
  • The Detection Engineering Lifecycle
  • Key Tools and Telemetry Sources

Understanding Log Sources for Government

  • Endpoint Logs and Event Artifacts
  • Network Traffic and Flow Data
  • Cloud and Identity Provider Logs

Threat Intelligence for Detection in Government

  • Types of Threat Intelligence
  • Using Threat Intelligence to Inform Detection Design
  • Mapping Threats to Relevant Log Sources

Building Effective Detection Rules for Government

  • Rule Logic and Pattern Structures
  • Detecting Behavioral vs. Signature-Based Activity
  • Using Sigma, Elastic, and SO Rules

Alert Tuning and Optimization for Government

  • Minimizing False Positives
  • Iterative Rule Refinement
  • Understanding Alert Context and Thresholds

Investigation Techniques for Government

  • Validating Detections
  • Pivoting Across Data Sources
  • Documenting Findings and Investigation Notes

Operationalizing Detections for Government

  • Versioning and Change Management
  • Deploying Rules to Production Systems
  • Monitoring Rule Performance Over Time

Advanced Concepts for Junior Engineers in Government

  • MITRE ATT&CK Alignment
  • Data Normalization and Parsing
  • Automation Opportunities in Detection Workflows

Summary and Next Steps for Government

Requirements

  • An understanding of fundamental networking concepts for government use.
  • Experience with operating systems such as Windows or Linux in a governmental context.
  • Familiarity with essential cybersecurity terminology for government applications.

Audience

  • Junior analysts interested in security monitoring for government agencies.
  • New SOC team members within government organizations.
  • IT professionals transitioning into detection engineering roles for government entities.
 21 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories