BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//swoogo.com//NONSGML kigkonsult.se iCalcreator 2.41.90//
CALSCALE:GREGORIAN
UID:62373261-3362-4966-b538-366264323961
BEGIN:VEVENT
UID:c101ca4268eb639f67cbdf37d811bfdd689264bb@swoogo.com
DTSTAMP:20260428T173854Z
DESCRIPTION:Â \n\nCourse Description \n\nThis two-day class covers how to se
 arch and report with ArcSight Logger. This course begins with a quick over
 view of Logger and moves into searching for events\, using search tools\, 
 working with filters and saved searches as well as designing and generatin
 g reports. The course wraps with report dashboards. \n\nPlease note this c
 ourse is a subset of the full Logger Administration and Operations course\
 , covering only the search and reporting modules of the full course. \n\nA
 udience/Job Roles \n\nThis course is intended for any system analysts who 
 need to search and report using ArcSight Logger.\n\nCourse Objectives \n\n
 Upon successful completion of this course\, you should be able to: \n\nâ€¢Ex
 plain how Logger processes event data\n\nâ€¢Enable peer Loggers for searchin
 g\n\nâ€¢Use the Search Builder tool as the common UI to create any queries\,
  in any combination withpipeline operators\n\nâ€¢Save a query as a filter or
  a saved search\, and retrieve it later\n\nâ€¢Run a report as a scheduled re
 port job\n\nâ€¢Copy and save a customized report template to meet your needs
 \n\nâ€¢Create and edit a report query\n\nâ€¢Design a new report dashboard\n\nP
 rerequisites/Recommended Skills \n\nTo be successful in this course\, you 
 should have the following prerequisites or knowledge: \n\nâ€¢ Basic Logger k
 nowledge or experience \n\nâ€¢ Possible attack activities\, such as scans\, 
 man in the middle\, sniffing\, DoS\, and possible abnormal activities\, su
 ch as worms\, Trojans\, and viruses \n\nâ€¢ Basic Windows operating system t
 asks and functions \n\nâ€¢ SIEM terminology\, such as threat\, vulnerability
 \, risk\, asset\, exposure\, and safeguards \n\nRecommended: \n\nâ€¢ Success
 ful completion of Use Case Foundations course or equivalent experience \n
 \nânâ Successful completion of Building Advanced Content course or equivalen
 t experience \n\nâ€¢ Successful completion of Flex Connector Configuration c
 ourse or equivalent experience \n\nCertification \n\nNo certification asso
 ciated with this course
DTSTART:20201005T070000Z
DTEND:20201006T150000Z
LAST-MODIFIED:20260428T173854Z
LOCATION:
SEQUENCE:0
STATUS:CONFIRMED
SUMMARY:LOG215 - ArcSight Logger Search and Reporting
TRANSP:OPAQUE
X-ALT-DESC;FMTTYPE=text/html:<div>\n<p align='left'>Â </p>\n\n<p><span style
 ='font-size:x-large\;'>Course Description </span></p>\n\n<p><span style='f
 ont-size:medium\;'>This two-day class covers how to search and report with
  ArcSight Logger. This course begins with a quick overview of Logger and m
 oves into searching for events\, using search tools\, working with filters
  and saved searches as well as designing and generating reports. The cours
 e wraps with report dashboards. </span></p>\n\n<p><span style='font-size:m
 edium\;'>Please note this course is a subset of the full Logger Administra
 tion and Operations course\, covering only the search and reporting module
 s of the full course. </span></p>\n\n<p><span style='font-size:x-large\;'>
 Audience/Job Roles </span></p>\n\n<p><span style='font-size:medium\;'>This
  course is intended for any system analysts who need to search and report 
 using ArcSight Logger.</span></p>\n\n<p><span style='font-size:x-large\;'>
 Course Objectives </span></p>\n\n<p><span style='font-size:medium\;'>Upon 
 successful completion of this course\, you should be able to: </span></p>
 \n\n<p><span style='font-size:small\;'>-</span><span style='font-family:Ar
 ial\, Arial\;'><span style='font-size:small\;'><span style='font-family:Ar
 ial\, Arial\;'><span style='font-size:small\;'>Explain how Logger processe
 s event data</span></span></span></span></p>\n\n<p><span style='font-famil
 y:Arial\, Arial\;'><span style='font-size:small\;'><span style='font-famil
 y:Arial\, Arial\;'><span style='font-size:small\;'>-Enable peer Loggers fo
 r searching</span></span></span></span></p>\n\n<p><span style='font-family
 :Arial\, Arial\;'><span style='font-family:Arial\, Arial\;'>-Use the Searc
 h Builder tool as the common UI to create any queries\, in any combination
  withpipeline operators</span></span></p>\n\n<p><span style='font-family:A
 rial\, Arial\;'><span style='font-family:Arial\, Arial\;'>-Save a query as
  a filter or a saved search\, and retrieve it later</span></span></p>\n\n<
 p><span style='font-family:Arial\, Arial\;'><span style='font-family:Arial
 \, Arial\;'>-Run a report as a scheduled report job</span></span></p>\n\n<
 p><span style='font-family:Arial\, Arial\;'><span style='font-family:Arial
 \, Arial\;'>-Copy and save a customized report template to meet your needs
 </span></span></p>\n\n<p><span style='font-family:Arial\, Arial\;'><span s
 tyle='font-family:Arial\, Arial\;'>-Create and edit a report query</span><
 /span></p>\n\n<p><span style='font-family:Arial\, Arial\;'><span style='fo
 nt-family:Arial\, Arial\;'>-Design a new report dashboard</span></span></p
 >\n\n<p><span style='font-size:x-large\;'>Prerequisites/Recommended Skills
  </span></p>\n\n<p><span style='font-size:medium\;'>To be successful in th
 is course\, you should have the following prerequisites or knowledge: </sp
 an></p>\n\n<p><span style='font-size:small\;'>- </span><span style='font-f
 amily:Arial\, Arial\;'><span style='font-size:small\;'><span style='font-f
 amily:Arial\, Arial\;'><span style='font-size:small\;'>Basic Logger knowle
 dge or experience </span></span></span></span></p>\n\n<p><span style='font
 -family:Arial\, Arial\;'><span style='font-size:small\;'><span style='font
 -family:Arial\, Arial\;'><span style='font-size:small\;'>- Possible attack
  activities\, such as scans\, man in the middle\, sniffing\, DoS\, and pos
 sible abnormal activities\, such as worms\, Trojans\, and viruses </span><
 /span></span></span></p>\n\n<p><span style='font-family:Arial\, Arial\;'><
 span style='font-family:Arial\, Arial\;'>- Basic Windows operating system 
 tasks and functions </span></span></p>\n\n<p><span style='font-family:Aria
 l\, Arial\;'><span style='font-family:Arial\, Arial\;'>- SIEM terminology\
 , such as threat\, vulnerability\, risk\, asset\, exposure\, and safeguard
 s </span></span></p>\n\n<p><span style='font-size:medium\;'>Recommended: <
 /span></p>\n\n<p><span style='font-size:medium\;'>- Successful completion 
 of Use Case Foundations course or equivalent experience </span></p>\n\n<p>
 <span style='font-size:medium\;'>- Successful completion of Building Advan
 ced Content course or equivalent experience </span></p>\n\n<p><span style=
 'font-size:medium\;'>- Successful completion of Flex Connector Configurati
 on course or equivalent experience </span></p>\n\n<p><span style='font-siz
 e:x-large\;'>Certification </span></p>\n\n<p><span style='font-family:Aria
 l\, Arial\;'><span style='font-size:medium\;'><span style='font-family:Ari
 al\, Arial\;'><span style='font-size:medium\;'>No certification associated
  with this course </span></span></span></span></p>\n</div>
BEGIN:VALARM
UID:39313733-3031-4665-a137-313238373230
ACTION:DISPLAY
DESCRIPTION:Â \n\nCourse Description \n\nThis two-day class covers how to se
 arch and report with ArcSight Logger. This course begins with a quick over
 view of Logger and moves into searching for events\, using search tools\, 
 working with filters and saved searches as well as designing and generatin
 g reports. The course wraps with report dashboards. \n\nPlease note this c
 ourse is a subset of the full Logger Administration and Operations course\
 , covering only the search and reporting modules of the full course. \n\nA
 udience/Job Roles \n\nThis course is intended for any system analysts who 
 need to search and report using ArcSight Logger.\n\nCourse Objectives \n\n
 Upon successful completion of this course\, you should be able to: \n\nâ€¢Ex
 plain how Logger processes event data\n\nâ€¢Enable peer Loggers for searchin
 g\n\nâ€¢Use the Search Builder tool as the common UI to create any queries\,
  in any combination withpipeline operators\n\nâ€¢Save a query as a filter or
  a saved search\, and retrieve it later\n\nâ€¢Run a report as a scheduled re
 port job\n\nâ€¢Copy and save a customized report template to meet your needs
 \n\nâ€¢Create and edit a report query\n\nâ€¢Design a new report dashboard\n\nP
 rerequisites/Recommended Skills \n\nTo be successful in this course\, you 
 should have the following prerequisites or knowledge: \n\nâ€¢ Basic Logger k
 nowledge or experience \n\nâ€¢ Possible attack activities\, such as scans\, 
 man in the middle\, sniffing\, DoS\, and possible abnormal activities\, su
 ch as worms\, Trojans\, and viruses \n\nâ€¢ Basic Windows operating system t
 asks and functions \n\nâ€¢ SIEM terminology\, such as threat\, vulnerability
 \, risk\, asset\, exposure\, and safeguards \n\nRecommended: \n\nâ€¢ Success
 ful completion of Use Case Foundations course or equivalent experience \n
 \nânâ Successful completion of Building Advanced Content course or equivalen
 t experience \n\nâ€¢ Successful completion of Flex Connector Configuration c
 ourse or equivalent experience \n\nCertification \n\nNo certification asso
 ciated with this course
TRIGGER:-PT30M
END:VALARM
END:VEVENT
END:VCALENDAR
