{"id":19331,"date":"2024-10-15T10:26:03","date_gmt":"2024-10-15T07:26:03","guid":{"rendered":"https:\/\/muk.training\/?p=19331"},"modified":"2024-10-16T13:52:11","modified_gmt":"2024-10-16T10:52:11","slug":"vebinar-cortex-xsiam-edu-270-module-5-data-source-ingestion-24-10-2024","status":"publish","type":"post","link":"https:\/\/muk.training\/ru\/vebinar-cortex-xsiam-edu-270-module-5-data-source-ingestion-24-10-2024\/","title":{"rendered":"\u0412\u0435\u0431\u0438\u043d\u0430\u0440 Webinar &#171;Cortex XSIAM (EDU-270) Module 5: Data Source Ingestion&#187; 24.10.2024"},"content":{"rendered":"<p>\u041f\u0440\u0438\u0433\u043b\u0430\u0448\u0430\u0435\u043c \u0432\u0441\u0435\u0445 \u0436\u0435\u043b\u0430\u044e\u0449\u0438\u0445 \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u0438\u0442\u044c\u0441\u044f \u043a \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u043e\u043c\u0443 \u043f\u043e\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u043c\u0443 \u0432\u0435\u0431\u0438\u043d\u0430\u0440\u0443 <strong>\u041c\u043e\u0434\u0443\u043b\u044c \u21165: Data Source Ingestion \u0438\u0437 \u043a\u0443\u0440\u0441\u0430 &#171;Cortex XSIAM for Security Operations and Automation (EDU-270)&#187; EDU-270&#8243;.\u00a0<\/strong><\/p>\n<p>\u041f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u044f\u0439\u0442\u0435\u0441\u044c \u043a \u043d\u0430\u043c \u043d\u0430 \u044d\u043a\u0441\u043a\u043b\u044e\u0437\u0438\u0432\u043d\u0443\u044e \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u0443\u044e \u0441\u0435\u0441\u0441\u0438\u044e \u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u0443\u0439\u0442\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 Cortex XSIAM \u043f\u043e \u043f\u0440\u0438\u0435\u043c\u0443 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445.<\/p>\n<p><strong>\u0410\u0434\u0436\u0435\u043d\u0434\u0430 \u0432\u0435\u0431\u0438\u043d\u0430\u0440\u0430:<\/strong><\/p>\n<p>o\u00a0\u00a0Brief Introduction to Cortex\u00ae XSIAM &amp; Datasets<\/p>\n<p>o\u00a0\u00a0 Introduction to Data Source Ingestion<\/p>\n<p>o\u00a0\u00a0 Syslog and API Collections Methods<\/p>\n<p>o\u00a0\u00a0 Parsers vs. Data Models<\/p>\n<p>o\u00a0\u00a0 Log Collection Strategies<\/p>\n<ul>\n<li><strong>\u0421\u0435\u0441\u0441\u0438\u044f 1 1 (JAPAC &amp; EMEA): \u0427\u0435\u0442\u0432\u0435\u0440\u0433, 24 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433<\/strong><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 1:30pm &#8212; 3:00pm SGT | 7:30am-9:00am CET<\/p>\n<p>o\u00a0\u00a0 \u0421\u0441\u044b\u043b\u043a\u0430 \u0434\u043b\u044f \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438: <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__paloaltonetworks.zoom.us_webinar_register_1917278565241_WN-5FDizXQGmyS4aEZkbo7OhIEg&amp;d=DwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=S7Y4URNMEPrdEEQYPaAKO_24Fpo6Li5aZ1cHkfZNv0M&amp;m=kSiyoHq2cxY8DrLgWRomAQkVBqPPAkX8LJDLHDX0FWBaSRDm9cBWx1wJOkjH55JL&amp;s=pdcTCJRIjppBOu493736Ip0B8Y9BifR1iotrMXixnjs&amp;e=\">https:\/\/paloaltonetworks.zoom.us\/webinar\/register\/1917278565241\/WN_DizXQGmyS4aEZkbo7OhIEg<\/a><\/p>\n<ul>\n<li><strong>\u0421\u0435\u0441\u0441\u0438\u044f \u2116 2 (AMERIAS &amp; EMEA): \u0427\u0435\u0442\u0432\u0435\u0440\u0433, 24 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433<\/strong><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 9:00pm &#8212; 10:30pm PDT | 6:00pm-7:30pm CET<\/p>\n<p>o\u00a0 \u0421\u0441\u044b\u043b\u043a\u0430 \u0434\u043b\u044f \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438: <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__paloaltonetworks.zoom.us_webinar_register_4017278907888_WN-5FNoCzJZfuTGekGjvpKjUKpg&amp;d=DwMGaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=S7Y4URNMEPrdEEQYPaAKO_24Fpo6Li5aZ1cHkfZNv0M&amp;m=kSiyoHq2cxY8DrLgWRomAQkVBqPPAkX8LJDLHDX0FWBaSRDm9cBWx1wJOkjH55JL&amp;s=Xr2uwXvaPVoo2DSn-w1WqjB5-HOgVRHeN4IYWLOUBRs&amp;e=\">https:\/\/paloaltonetworks.zoom.us\/webinar\/register\/4017278907888\/WN_NoCzJZfuTGekGjvpKjUKpg<\/a><\/p>\n<ul>\n<li>\u0412\u0441\u0435 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442 \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0447\u0435\u0431\u043d\u044b\u0435 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b (EDU-270 Module 5: Data Source Ingestion)<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u041f\u0440\u0438\u0433\u043b\u0430\u0448\u0430\u0435\u043c \u0432\u0441\u0435\u0445 \u0436\u0435\u043b\u0430\u044e\u0449\u0438\u0445 \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u0438\u0442\u044c\u0441\u044f \u043a \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u043e\u043c\u0443 \u043f\u043e\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u043c\u0443 \u0432\u0435\u0431\u0438\u043d\u0430\u0440\u0443 \u041c\u043e\u0434\u0443\u043b\u044c \u21165: Data Source Ingestion \u0438\u0437 \u043a\u0443\u0440\u0441\u0430 &#171;Cortex XSIAM for Security Operations and Automation (EDU-270)&#187; EDU-270&#8243;.\u00a0 \u041f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u044f\u0439\u0442\u0435\u0441\u044c \u043a \u043d\u0430\u043c \u043d\u0430 \u044d\u043a\u0441\u043a\u043b\u044e\u0437\u0438\u0432\u043d\u0443\u044e \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u0443\u044e \u0441\u0435\u0441\u0441\u0438\u044e \u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u0443\u0439\u0442\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 Cortex XSIAM \u043f\u043e \u043f\u0440\u0438\u0435\u043c\u0443 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445. \u0410\u0434\u0436\u0435\u043d\u0434\u0430 \u0432\u0435\u0431\u0438\u043d\u0430\u0440\u0430: o\u00a0\u00a0Brief Introduction to Cortex\u00ae XSIAM &amp; Datasets o\u00a0\u00a0 Introduction to Data Source [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[323],"tags":[],"toolset-meta":{"kursy-daty-provedeniya":[]},"_links":{"self":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/19331"}],"collection":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/comments?post=19331"}],"version-history":[{"count":3,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/19331\/revisions"}],"predecessor-version":[{"id":19339,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/posts\/19331\/revisions\/19339"}],"wp:attachment":[{"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/media?parent=19331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/categories?post=19331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/muk.training\/ru\/wp-json\/wp\/v2\/tags?post=19331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}