Course Outline
Foundations of Detection Engineering for Government
- Core Concepts and Responsibilities
- The Detection Engineering Lifecycle
- Key Tools and Telemetry Sources
Understanding Log Sources for Government
- Endpoint Logs and Event Artifacts
- Network Traffic and Flow Data
- Cloud and Identity Provider Logs
Threat Intelligence for Detection in Government
- Types of Threat Intelligence
- Using Threat Intelligence to Inform Detection Design
- Mapping Threats to Relevant Log Sources
Building Effective Detection Rules for Government
- Rule Logic and Pattern Structures
- Detecting Behavioral vs. Signature-Based Activity
- Using Sigma, Elastic, and SO Rules
Alert Tuning and Optimization for Government
- Minimizing False Positives
- Iterative Rule Refinement
- Understanding Alert Context and Thresholds
Investigation Techniques for Government
- Validating Detections
- Pivoting Across Data Sources
- Documenting Findings and Investigation Notes
Operationalizing Detections for Government
- Versioning and Change Management
- Deploying Rules to Production Systems
- Monitoring Rule Performance Over Time
Advanced Concepts for Junior Engineers in Government
- MITRE ATT&CK Alignment
- Data Normalization and Parsing
- Automation Opportunities in Detection Workflows
Summary and Next Steps for Government
Requirements
- A foundational understanding of networking concepts
- Practical experience with operating systems, such as Windows or Linux
- Knowledge of basic cybersecurity terminology
Audience
- Junior analysts with an interest in security monitoring for government
- New members of Security Operations Centers (SOCs)
- IT professionals transitioning into detection engineering roles
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent