GRA Technical Training

GRATraining

Ownership of any advanced security analytics solution represents a significant capital and resource investment. Adoption of Gurucul Risk Analytics provides organizations with the most powerful and varied of risk analytics capabilities in the industry. Maximizing that investment, by taking full advantage of all Gurucul’s rich features, clearly benefits an organization’s bottom line. Gurucul’s Technical Training Program operates with the following principles:





Why Consider GRA Technical Training?

Delivering seasoned expertise, Gurucul’s program provides comprehensive hands-on instruction to streamline and optimize a security team’s utility of the solution’s rich capabilities.

Gurucul Risk Analytics’ technical training prepares end users, managers, SOC analysts and data scientists to leverage the highest value from GRA implementations. Gurucul offers custom designed classes held onsite at your location, standard classes conducted regionally, or at our headquarters conveniently located near the Los Angeles Airport. Instructor-led training is considered the most effective learning format, due to the dynamic interactivity between students and the trainer. Learning is accomplished through a combination of lectures, hands-on labs and demonstrations.

Learning Objectives

At the highest level, students will learn to define data sources and import data. As well, they will gain proficiency in creating resource groups and importing resources, entitlements, account and activity data. Students will also understand linked data analysis rules and learn about the different types of accounts and their linkages. Configuration of anomaly detection settings will empower the student’s ability to analyze behavior with the help of risk scores and risk profiles. The management of tickets and cases to remediate issues will also be included in the curriculum.

GRA-Training2

GRA Feature Highlights

Prioritized Alerts

GRA offers a unique identity-centric view which provides an actionable first step in your investigation and forensics process. The GRA dashboard provides customizable views of your organization’s risk through contextual visualizations, highlighting high-risk users, resources and transactions, based on behavior anomalies and dynamic peer group analytics.

Risk and Threat Intelligence

GRA provides actionable intelligence, detecting risky behaviors before incidents occur. GRA’s patent pending self-learning behavior-based algorithms consolidate identity profiles with machine data and alerts from defense-in-depth security solutions, creating context-aware timeline visualizations. GRA further extends the value of this cross-correlated data by creating behavior baselines and dynamic peer group analysis to prevent, detect and remediate previously unknown anomalies.

Self-Audit™

GRA’s unique Self-Audit™ feature set provides end users and partners with a customizable online view of their identity, access and risk-ranked activity. GRA’s Self-Audit™ extends traditional information security programs into the business with a two-way collaboration, showing end users and partners what they have accessed, when they accessed it, from what geo-location, and with what device – highlighting anomalous transactions with reports similar to a credit card statement.

Identity Analytics

GRA’s Access Analytics provides the capability to analyze accounts and entitlements (high privileged, shared & regular) for outlier intelligence and to identify excess access risk. Behavior-based machine learning for identity and access often results in radical reductions for accounts and access entitlements. Identity is a threat plane requiring identity and access data science that predicts and prevents security risks, assists with high privilege access monitoring, excess access, compliance, and intelligent provisioning. Access analytics cleanse, manage, secure and govern identity and their associated access to critical data and assets.



TRAINING
EXPERTISE

Gurucul’s trainers are highly qualified in the knowledge transfer of best practices in risk-based analytics, along with facilitating optimal use of the solution’s rich and complex features.




KNOWLEDGE OPTIMIZATION
Targeted training on key features and concepts and in-depth learning on critical methodologies, maximizes the SOC team’s efficiencies through empowered knowledge.




TEAM
PRODUCTIVITY

Build highest level of productivity into risk assessment analytical frameworks, while maximizing security analyst workforce productivity with targeted training.




COST
SAVINGS

Reduce operational costs by getting the SOC team up and running effectively, with the right information, fostering process knowledge to be shared within the organization.




PROCESS
ACCELERATION

With team efficiencies realized from targeted training, security analytics processes are optimized
and streamlined for maximum
effectiveness.


GRA Training Program Components

Course Syllabus

  • Introduction to GRA
    • GRA use cases
    • GRA features and benefits
    • GRA architecture
  • GRA environment setup
  • Data required for GRA
    • User imports
    • Resource imports
    • Account imports
    • Entitlement imports
    • Activity imports
  • Identity analytics (IdA)
  • Activity monitoring and reporting
  • User and entity behavior analytics (UEBA)
  • Miner™ for Raw Search
  • Monitoring high-risk users
  • Self-Audits
  • Case management
  • Advanced GRA configurations

Hands-on Labs & Demos

  • Configuring data sources
  • Configuring user imports
  • Configuring resource groups
  • Configuring resources
  • Configuring resource attributes
  • Configuring account imports
  • Configuring account entitlement imports
  • Configuring real-time activity imports
  • How to link rogue and orphan accounts
  • Walk-through application analytics dashboard
  • Walk-through activity monitoring (Miner)
  • Configuring anomaly detection jobs
  • Walk-through predictive security dashboard
  • Walk-through high-risk users dashboard
  • Walk-through case management functionality
  • Creating GRA users and roles
  • Walk-through GRA advanced configuration settings

Duration: 2 or 3 Days

Words from Gurucul Customers & Leaders

Learn More