This website uses cookies. By clicking OK, you consent to the use of cookies.
Click Here
to learn more about how we use cookies.
OK
RSA.com
Products
Archer
®
Archer
®
Advisories
Blog
Discussions
Documentation
Downloads
Ideas
Knowledge Base
Archer
®
Exchange
Training
Upcoming Events
Videos
RSA
®
Fraud & Risk Intelligence Suite
RSA
®
Fraud & Risk Intelligence Suite
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
FraudAction Services
RSA
®
Web Threat Detection
Upcoming Events
Videos
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication Cloud
Advisories
Blog
Discussions
Documentation
Downloads
Events
Ideas
Knowledge Base
Training
Upcoming Patch Content
Videos
RSA
®
Adaptive Authentication Mobile SDK
RSA
®
Adaptive Authentication Mobile SDK
Advisories
Events
Ideas
Knowledge Base
Request Access
Training
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication On-Premise 14.x
Advisories
Blog
Discussions
Documentation
Downloads
Events
Ideas
Knowledge Base
Training
Videos
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 7.x
Advisories
Blog
Discussions
Documentation
Downloads
Events
Ideas
Knowledge Base
Training
Videos
RSA
®
Adaptive Authentication for eCommerce
RSA
®
Adaptive Authentication for eCommerce
Advisories
Blog
Discussions
Documentation
Ideas
Knowledge Base
Training
Videos
RSA
®
FraudAction Services
RSA
®
FraudAction Services
Advisories
Discussions
Documentation
Ideas
Videos
RSA
®
Web Threat Detection
RSA
®
Web Threat Detection
Advisories
Blog
Discussions
Documentation
Downloads
Ideas
Knowledge Base
Videos
RSA NetWitness
®
Platform
RSA NetWitness
®
Platform
Advisories
Blog
Discussions
Documentation
Downloads
Ideas
Integrations
Knowledge Base
Training
Upcoming Events
Videos
RSA NetWitness
®
Detect AI
RSA NetWitness
®
Detect AI
Documentation
RSA NetWitness
®
Investigator
RSA NetWitness
®
Investigator
Documentation
Download the Client
RSA NetWitness
®
Orchestrator
RSA NetWitness
®
Orchestrator
Overview
Documentation
RSA SecurID
®
Suite
RSA SecurID
®
Suite
Advisories
Blog
Discussions
Documentation
Downloads
Knowledge Base
Ideas
Integrations
Training
Videos
RSA
®
Identity Governance & Lifecycle
RSA
®
Identity Governance & Lifecycle
Advisories
Blog
Community Exchange
Discussions
Documentation
Downloads
Ideas
Knowledge Base
Training
Upcoming Events
Videos
RSA SecurID
®
Access
RSA SecurID
®
Access
Advisories
Blog
Discussions
Documentation
Downloads
Ideas
Integrations
Knowledge Base
Training
Upcoming Events
Videos
Other RSA
®
Products
Other RSA
®
Products
RSA
®
Access Manager
RSA
®
Data Loss Prevention
RSA
®
Digital Certificate Solutions
RSA enVision
®
RSA
®
Federated Identity Manager
Resources
Advisories
Product Advisories on RSA Link
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication Hosted
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
FraudAction Services
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Product Advisories
Blogs
Blogs on RSA Link
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Blogs on RSA Link
Discussion Forums
Discussion Forums
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
FraudAction Services
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Discussion Forums on RSA Link
Documentation
Product Documentation
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication Mobile SDK
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
FraudAction Services
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Documentation on RSA Link
Downloads
Product Downloads
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Downloads on RSA Link
Ideas
Idea Exchange
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication Mobile SDK
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
FraudAction Services
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Documentation on RSA Link
Knowledge Base
Knowledge Base
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication Mobile SDK
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Knowledge Base Pages on RSA Link
Upcoming Events on RSA Link
Upcoming Events
Videos
Videos on RSA Link
Archer
®
RSA
®
Adaptive Authentication Cloud
RSA
®
Adaptive Authentication On-Premise 7.x
RSA
®
Adaptive Authentication On-Premise 14.x
RSA
®
Adaptive Authentication for eCommerce
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
RSA
®
Web Threat Detection
All Videos on RSA Link
Support
RSA Link Support
RSA Link Support
News & Announcements
Getting Started
Support Forum
Support Knowledge Base
Ideas & Suggestions
RSA Product Support
RSA Product Support
General Security Advisories and Statements
Product Life Cycle
Support Information
RSA Ready
RSA University
Certification Program
Certification Program
Course Catalogs
Course Catalogs
Archer
®
RSA NetWitness
®
Platform
RSA SecurID
®
Suite
On-Demand Subscriptions
On-Demand Subscriptions
Archer
®
RSA NetWitness
®
Platform
RSA SecurID
®
Suite
Product Training
Product Training
Archer
®
RSA
®
Fraud & Risk Intelligence Suite
RSA
®
Identity Governance & Lifecycle
RSA NetWitness
®
Platform
RSA SecurID
®
Access
Student Resources
Student Resources
Access On-Demand Learning
Access Virtual Labs
Contact RSA University
Enrollments & Transcripts
Frequently Asked Questions
Getting Started
Learning Modalities
Payments & Cancellations
Private Training
Training Center Locations
Training Credits
YouTube Channel
Upcoming Events
Upcoming Events
Full Calendar
Conferences
Live Classroom Training
Live Virtual Classroom Training
Webinars
Sign In
Register Now
Entire Website
This Location
Events
Documents
Users
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
Announcements
RSA
®
University Upcoming Events
RSA Link
:
RSA University
:
RSA University Upcoming Events
Options
Subscribe
Mark all as New
Mark all as Read
Entire Website
This Location
Events
Documents
Users
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
Product Resources
Certification Program
Course Catalogs
Archer
RSA NetWitness Platform
RSA SecurID Suite
On-Demand Subscriptions
Archer
RSA NetWitness Platform
RSA SecurID Suite
Product Training
Archer
RSA Fraud & Risk Intelligence Suite
RSA Identity Governance & Lifecycle
RSA NetWitness Platform
RSA SecurID Suite
Student Resources
Access On-Demand Learning
Access Virtual Labs
Contact RSA University
Enrollments & Transcripts
Frequently Asked Questions
Getting Started
Learning Modalities
Payments & Cancellations
Private Training
Training Center Locations
Training Credits
YouTube Channel
Upcoming Events
Full Calendar
Conferences
Live Classroom Training
Live Virtual Classroom Training
Webinars
Showing events with label
Live Virtual Classroom Training
.
Show all events
«
Previous
1
2
Next
»
0 attendees
0
0
RSA NetWitness Platform Content Creation (EMEA)
Monday, March 15, 2021
Live Virtual Classroom Training
This training provides recommended methodologies for creating content to assist you in discovering, analyzing and resolving threats in RSA NetWitness Platform. Students will benefit from both lecture and hands-on lab exercises using a virtual environment to practice the techniques learned in class. Audience Anyone interested in creating content in RSA NetWitness to highlight and discover potential threats Prerequisite Knowledge/Skills Student should have completed or have comparable knowledge to what is provided in the following course: RSA NetWitness Platform Foundations Course Objectives Upon successful completion of this course, participants should be able to: Identify what content to use when Describe the data model and process flow Describe how to optimize content for performance and results Monitor the performance of parsers Create content for specific use cases Create content from LIVE and other sources, such as STIX feeds Create content using a recommended process Create an alert taxonomy Use reports to test the efficacy of rules Create content for current threats Whitelist normal traffic and false positives Click HERE to register for this training. If you need assistance with registration click HERE to open a ticket.
Labels
(1)
Labels
Labels:
Live Virtual Classroom Training
0 attendees
0
0
1 attendees
0
0
Archer New User Experience
Monday, March 15, 2021
Live Virtual Classroom Training
This activity driven course will guide new Archer users in navigating the user interface, entering records, completing assigned workflow tasks, searching, reporting, and customizing the interface. The skills learned during this foundational course can be generalized to a client specific environment. Audience • RSA Customers • RSA Partners • RSA Internal Staff Prerequisite Knowledge/Skills Students should have basic computer skills but no previous Archer expertise is required Course Objectives Upon successful completion of this course, participants should be able to: • Navigate the Archer user interface • Use applications to enter and modify records • Interact with tasks and workflows to complete job functions • Use search tools to retrieve information • Create and update reports and charts • Build personal dashboards • Leverage system-level and community-level user resources Click HERE to register for this training If you need assistance click HERE to open a ticket.
Labels
(1)
Labels
Labels:
Live Virtual Classroom Training
1 attendees
0
0
1 attendees
0
0
Developing Archer Power Users and Business Analysts
Tuesday, March 16, 2021
Live Virtual Classroom Training
This course will teach participants how to “Think Archer” and to effectively create Archer specific business requirements and map workflows. The course fosters the development of Archer Power-users and Business Analysts within your organization to bridge the knowledge-gap between standard Archer Users and System Administrators. Participants will gain a deeper understanding of the out-of-the-box Archer usecases and begin expanding their skills to become future Archer application owners. Upon completion, participants will be able to communicate application and workflow designs to administrators for development and implementation. Audience • RSA Customers • RSA Partners • RSA Internal Staff Prerequisite Knowledge/Skills Students should have and be familiar with the following skills and concepts prior to attending this course: • Basic computer skills • Previous RSA Archer Experience, Getting Started with Archer: Foundational Skills Video, or Archer New User Experience course • Familiarity with your organizational needs and work processes Course Objectives Upon successful completion of this course, participants should be able to: • Analyze business practices to design an Archer Application • Analyze business practices to design an Archer Workflow • Evaluate Archer system options related to building and maintaining applications, questionnaires and workflows • Design Reports, Dashboards and Workspaces to optimize tracking and efficiency • Explain basic access control options • Identify email and notification options • Explain integration options and determine the best use of each • Explain and complete deep-dive workflow activities related to Archer “Use-Cases” pertinent to personal areas of interest Click HERE to register for this training If you need assistance click HERE to open a ticket.
Labels
(1)
Labels
Labels:
Live Virtual Classroom Training
1 attendees
0
0
0 attendees
0
0
RSA NetWitness Platform Analysis (EMEA)
Wednesday, March 17, 2021
Live Virtual Classroom Training
This training provides hands-on experience using the RSA NetWitness Platform to investigate and document security incidents. The course consists of about 50% hands-on lab work, following a practical methodology from the incident queue through investigation, event reconstruction, damage assessment, and documentation using real-world use cases Audience Level 1 and Level 2 analysts relatively new to RSA NetWitness Platform, who wish to increase their familiarity with the tool’s features and functions within the context of incident response and analysis. Prerequisite Knowledge/Skills Students should have familiarity with the basic processes of cybersecurity analysis, including some knowledge of network architecture, the TCP/IP stack, networking protocols, and integrating log & network traffic to perform analysis on network-based security events. Students should have completed the following courses (or have equivalent knowledge) prior to taking this training: RSA NetWitness Platform Foundations Course Objectives Upon successful completion of this course, participants should be able to: Identify Analyst roles and SOC models Describe incident types and methods to prioritize incidents Describe the Incident Response process Use analysis tools and interfaces to perform incident response Describe the Investigative Methodology Describe a systematic approach to investigate metadata Describe the Investigation Model Identify types of threats Use the incident response process, the investigative methodology and tools to investigate multiple use cases using packets, logs and endpoint Click HERE to register for this training. If you need assistance with registration click HERE to open a ticket.
Labels
(1)
Labels
Labels:
Live Virtual Classroom Training
0 attendees
0
0
1 attendees
0
0
Archer Assessment and Authorization for Public Sector
Thursday, March 18, 2021
Live Virtual Classroom Training
Overview This two-day classroom-based training offers a look into the automation of Assessment and Authorization (A&A) built to fit your risk and compliance needs. This course addresses the process of authorizing a new system to operate, and introduces how those systems can be leveraged to provide a high-level look at risk across an organization. The structure and operations of the Archer Public Sector use case, including A&A and Plan of Action and Milestones (POA&Ms), will be explored through lecture and hands-on experience. An introduction to Archer's Continuous Monitoring (CM) solution will also be provided. Audience Archer users responsible for the procurement, development, integration, modification, or maintenance of an information system and its security posture. Prerequisite Knowledge/Skills Students should have familiarity with navigating Archer, or have completed the Archer Reporting and Navigation course. Learning Objectives Upon successful completion of this course, participants should be able to: Explain the components of the Public Sector use case Create an Authorization Package Allocate and assess appropriate Controls for an Authorization Package Submit an Authorization Package for ATO Decision Create and Submit a POA&M Review, Approve, and Close a POA&M Create and Submit a Risk Acceptance Request Explain how A&A interacts with CM Identify how data collected within CM is used to gain visibility into risk across the organization Click HERE to register for this training. If you need assistance please click HERE to open a ticket.
Labels
(1)
Labels
Labels:
Live Virtual Classroom Training
1 attendees
0
0
«
Previous
1
2
Next
»