Check the possibilities of them, this will be done with penetration tool metasploit. For this reason you will create a virtual environment of small business network, which you will watch it with these Siem tools. The penetration testing results which will be done on the system, you will write them down and you will analyze and compare them to show the possibilities of every siem tool.
-Also you will create a .doc file with the cases you can use these siem tools
BIDDERS SHOULD ALREADY KNOW ABOUT SIEM TOOLS, METASPLOIT AND PENETRATION TESTING BEFORE BIDDDING