Get in Touch

Course Outline

  • Defining the Security Operations Center
  • Comprehending Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Comprehending Basic Cryptography Concepts
  • Comprehending Common TCP/IP Attacks
  • Comprehending Endpoint Security Technologies
  • Comprehending Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Comprehending Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Comprehending SOC Metrics
  • Comprehending SOC Workflow and Automation
  • Describing Incident Response
  • Comprehending the Use of VERIS
  • Comprehending Windows Operating System Basics
  • Comprehending Linux Operating System Basics

Requirements

  • Knowledge of Ethernet and TCP/IP networking
  • Practical experience with Windows and Linux operating systems
  • Familiarity with fundamental networking security concepts
 35 Hours

Testimonials (3)

Upcoming Courses

Related Categories