Course Outline

Foundations of Detection Engineering for Government

  • Core Concepts and Responsibilities
  • The Detection Engineering Lifecycle
  • Key Tools and Telemetry Sources

Understanding Log Sources for Government

  • Endpoint Logs and Event Artifacts
  • Network Traffic and Flow Data
  • Cloud and Identity Provider Logs

Threat Intelligence for Detection in Government

  • Types of Threat Intelligence
  • Using Threat Intelligence to Inform Detection Design
  • Mapping Threats to Relevant Log Sources

Building Effective Detection Rules for Government

  • Rule Logic and Pattern Structures
  • Detecting Behavioral vs. Signature-Based Activity
  • Using Sigma, Elastic, and SO Rules

Alert Tuning and Optimization for Government

  • Minimizing False Positives
  • Iterative Rule Refinement
  • Understanding Alert Context and Thresholds

Investigation Techniques for Government

  • Validating Detections
  • Pivoting Across Data Sources
  • Documenting Findings and Investigation Notes

Operationalizing Detections for Government

  • Versioning and Change Management
  • Deploying Rules to Production Systems
  • Monitoring Rule Performance Over Time

Advanced Concepts for Junior Engineers in Government

  • MITRE ATT&CK Alignment
  • Data Normalization and Parsing
  • Automation Opportunities in Detection Workflows

Summary and Next Steps for Government

Requirements

  • A foundational understanding of networking concepts
  • Practical experience with operating systems, such as Windows or Linux
  • Knowledge of basic cybersecurity terminology

Audience

  • Junior analysts with an interest in security monitoring for government
  • New members of Security Operations Centers (SOCs)
  • IT professionals transitioning into detection engineering roles
 21 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories