You are on page 1of 2

RSA Security Analytics Installation &



This course provides an indepth look at the
installation and
configuration of RSA
Security Analytics, including
the hardware and services
used, configuration steps,
confirming data
transmission, and helpful
hints, tools and resources
by an RSA Advanced
Technical Support Engineer.

This interactive, self-paced eLearning will walk you through the process of installing RSA
Security Analytics. Through a series of on-demand videos, you will first review the
hardware components of a Security Analytics implementation, you will then walk through
how to install the various services of Security Analytics, including: the SA Server,
Decoders, the Concentrator, and Broker.
You will then be shown how to configure the services and connect them together to allow
data to flow through the system. After confirming data is flowing through the system,
you will review the steps to check the health and wellness of the system.
You will have an opportunity to test knowledge gained in an assessment after this course.
After completing the assessment, you can let RSA Education Services know what you
thought of the overall content presented.

Anyone installing RSA Security Analytics

For an up-to-date schedule of
Instructor-led classes and other
training options, visit the RSA
University pages on RSA Link RSA’s community web site:
Phone: 800-995-5095



781- 515-6630

174 Middlesex Turnpike
Bedford, Massachusetts 01730

4 hours (eLearning)

Prerequisite Knowledge/Skills
It is strongly recommended that you complete the following prerequisite training:

RSA Security Analytics Foundations (Classroom Training)
Introduction to RSA Security Analytics (eLearning)

Students should also be familiar with basic computer architecture, data networking
fundamentals and general information security concepts.

Course Objectives
Upon successful completion of this course, participants should be able to:

Explain elements of the proper process for the installation and configuration of RSA
Security Analytics

Successfully connect the hardware that will be used in an RSA Security Analytics

Locate documentation and web-based resources for installing RSA Security Analytics

Identify processes that require special attention during installation of RSA Security

Summarize the important configuration tasks when configuring RSA Security

. RSA. Archer. All rights reserved. RSA Security. NetWitness and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries.Course Outline  Course Introduction  ▬ ▬ ▬ ▬ Hardware Configuration Overview of Series IV Hardware Overview of DAC Illustrate cabling of devices Configuring and allocating storage ▬ ▬ Building a Hybrid Appliance Installation of CentOS Installation of SA Server ▬ ▬ ▬ Installing Security Analytics Components Installation of Decoders Installation of Concentrator Installation of Broker ▬ Setting up the SA Service Account Enabling communication between services ▬ ▬ ▬ ▬ Configuring Security Analytics Services Configuring Decoders Configuring Concentrator Configuring Broker Connecting services together      Confirming Data Flow and Monitoring Health & Wellness ▬ Confirm services communication ▬ Overview of Health and Wellness module  Course Review  Assessment  Course Evaluation © Copyright 2015 EMC Corporation. EMC. EMC2.