Skip to content

Social Network Badges

  • Facebook
  • Twitter
  • RSS

Training

Log Analysis and Security Visualization Workshops

Sign up for BlackHat Visualization Workshop in Las Vegas, July 2013!

spacer

Customizable Modules

Our workshops are custom tailored towards the client or audience that we are presenting for. There are six main modules we offer. Any combination and depth level is applicable. Each section of each module comes with hands-on exercises. Depending on the audience, sometimes the exercises are taken out of the workshop. It’s all up to the client’s needs.

The Modules

Visualization

  • information visualization history
  • visualization theory
  • data visualization tools and libraries
  • visualization resources

Security Visualization

  • perimeter threat use-cases
    • network flow data
    • firewall data
    • IDS/IPS data
    • proxy data
    • user activity
  • insider threat
  • compliance visualization
  • host-based data analysis

Network Forensics

  • networking theory
  • network traffic capture
  • traffic analysis tools
  • network traffic visualization

Log Management and SIEM

  • log management and siem overview
  • application logging guidelines
  • logging as a service
  • big data technologies

Log Analysis

  • data sources
  • data analysis and visualization linux (davix)
  • log data processing
  • introduction to R
  • loggly api overview

Splunk

  • splunk introduction
  • data analysis with splunk
  • packet capture analysis in splunk
  • advanced splunk uses (lookups, etc.)
spacer

Workshop Abstract

As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today’s state-of- the-art data visualization techniques, you can gain a far deeper understanding of what’s happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods. The attendees will learn about log analysis, get an overview of visualization, data sources for IT security, and learn how to generate visual representations of IT data. The training is filled with hands-on exercises utilizing the DAVIX live CD.

Audience

The following shows a matrix of what modules are best suited for what audiences: spacer spacer

spacer

Testimonials

“Materials are generated from real-world experiences hence all things learnt are really practical and useful.”
“The class was pretty intensive (with loads of stuff – theory and practical).”
“Certainly, it changed my perception on doing log analysis traditionally and paved new ways to work on log analysis.”
“Cool stuff!”
“Very informative in understanding core concepts with SecVisualization.”
“Probably the most useful speaker of the day. He provided very good information on how to visualize data. I would like to see him come back in a workshop type format where we could bring the logs that our applications actually create and he could help us filter them and put it in a useful format.
“This was one of the more interesting talks.”

Past Workshops

spacer
  • Visualization Workshop for Norman Security, San Diego, California, March 2013
  • Log Analysis and Visualization Workshop, Doha, Qatar, February 2013
  • Log Analysis and Visualization Workshop, Dubai, UAE, November 2012
  • Visual Analytics Workshop, Nordic Security Conference, Reykjavik, Iceland, August 2012
  • Information Visualization – Bridging the Gap Between Tufte and Firewalls, Annual Honeynet Workshop, Palo Alto, USA, March 2012
  • Log Analysis and Visualization Workshop for Trend Micro, Taipei, Taiwan, September 2011
  • Log Analysis and Visualization Workshop, Taipei, Taiwan, March 2011
  • Log Analysis Martial Arts, HoneyNet Annual Workshop, Mexico City, April 2010
  • Advanced Splunk and Visualization Training, Singapore, January 2010
  • Visualization and Logging Workshop, NorCERT, Oslo, Norway, October 2009.
  • “Data Analysis And Visualization” Workshop, HoneyNet Alliance, Kuala Lumpur, Malaysia, February 2009.
  • “Security Visualization Research” Workshop, Colloquium for Information Systems Security Education (CISSE), Seattle, June 2009.
  • “Applied Security Visualization” Workshop, IS Summit 2008, Hong Kong, November 2008.
  • “DAVIX Workshop on Visualization”, DefCon, Las Vegas, August, 2008.
  • Applied Security Visualization” Workshop, First Conference 2008, Vancouver, June 2008.
spacer
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.