Learning Objectives

Upon completing this course, you will be able to:

  • Describe how Cloud SIEM transforms logs into actionable security signals through detection rules
  • Identify the log sources that power Cloud SIEM, including cloud audit logs, identity systems, and network flow logs
  • Explain how OCSF normalizes data across different sources for consistent detection
  • Use investigation tools including dashboards, Risk Insights, Cloud SIEM Investigator, and Bits AI
  • Apply operational best practices for measuring and improving security operations effectiveness

Primary Audience

  • DevOps and security engineers interested in securing their cloud environments with a SIEM (Security and Incident and Event Management) tool.
  • Cloud practitioners interested in threat detection in a public cloud environment.

Prerequisites

The following are prerequisites for this course:

Technical Requirements

In order to complete the course, you will need:

  • Google Chrome or Firefox
  • Third-party cookies must be enabled to access labs

Course Navigation

At the bottom of each lesson, click MARK LESSON COMPLETE AND CONTINUE button so that you are marked complete for each lesson and can receive the certificate at the end of the course.

Course Enrollment Period

Please note that your enrollment in this course ends after 30 days. You can re-enroll at any time and pick up where you left off.

Course Curriculum

    1. Introduction

    1. Ingest and Enrich Logs

    2. Detect Threats

    3. Triage and Investigate

    4. Respond and Report

    1. Lab Overview

    2. Lab: Introduction to Cloud SIEM

    1. Summary

    2. Feedback Survey

Introduction to Cloud SIEM

  • 2 hours to complete
  • 8 Lessons
  • Intermediate