About Course
Course Content
Detailed course content
-
Definition of the Security Operations Center (SOC): Introduction and understanding of the role and function of a SOC.
-
Understanding network infrastructure and network security monitoring tools: Overview of network infrastructure components and monitoring tools.
-
Exploration of data type categories: Identification and categorization of data for security analysis.
-
Understanding basic concepts of cryptography: Introduction to cryptographic techniques and their applications.
-
Understanding common TCP/IP attacks: Analyze and defend against common attacks on the TCP/IP protocol.
-
Understanding endpoint security technologies: Overview of endpoint protection technologies.
-
Understanding incident analysis in a threat-centric SOC: methods and techniques for analyzing security incidents.
-
Identification of resources for hunting cyber threats: Tools and techniques for identifying and tracking cyber threats.
-
Understanding event correlation and normalization: Techniques for correlating and normalizing security events.
-
Identification of common attack vectors: Detection and analysis of common methods used by attackers.
-
Identification of malicious activities: Methods for identifying and analyzing malicious activity on the network.
-
Detection of suspicious behavior patterns: Analysis and detection of suspicious patterns and anomalies.
-
Conducting security incident investigations: Step-by-step guide to investigating and documenting security incidents.
-
Use of a playbook model to organize security monitoring: Creation and use of playbooks for structured security monitoring.
-
Understanding SOC metrics: Overview of key metrics for evaluating the performance of a SOC.
-
Understanding SOC workflow and automation: Introduction to the workflow and automation within a SOC.
-
Describe the response to incidents: Processes and protocols to respond effectively to security incidents.
-
Understanding the use of VERIS: Application of the Vocabulary for Event Recording and Incident Sharing (VERIS) for standardized reporting of security incidents.
-
Fundamentals of the Windows operating system: Introduction and security-relevant aspects of the Windows operating system.
-
Basics of the Linux operating system: Introduction and security-relevant aspects of the Linux operating system.
