What you'll learn:
- Understand What a SOC Is
- Understand what a SOC does
- Understand what skills are needed in a SOC
- Understand common Technology and Use-Cases that a SOC uses
This course will teach you how to effectively manage your organization's security operations, identify potential threats, and respond to security incidents.
Who is this course for?
This course is designed for security professionals, IT managers, and anyone interested in SOC operations. Whether new to the field or looking to refresh your skills, this course will provide the knowledge and tools you need to succeed.
What will you learn?
The fundamentals of SOC operations
How to identify and respond to security threats
Best practices for managing security incidents
How to effectively communicate with stakeholders
Course features
Self-paced learning: Learn at your own pace and on your schedule.
Interactive modules: Engage with the material through interactive exercises and quizzes.
Real-world examples: Learn from real-world examples and case studies.
Expert instructors: Learn from experienced instructors with experience in the field.
Chapters in this course
Introduction
Emerging Threat Landscape
Implementing Cyber Risk Management
Classifying Info and Data, DLP
Compliance and Governance
Security, Privacy & Reg. Compliance Controls
Access Controls, IAM & PAM
The MITRE Att@ck Framework
Defining a Security Operations Center
Personnel Development, Retention, & Attracting Talent
Process
Procedures
Dashboards & Use-Cases
Automation
Continuous Training
Secure Code Review & Application Security
Security Monitoring
Introduction To Threat-Hunting
Threat-Hunting, Step-by-Step
Threat Intelligence: Intelligence Lifecycle
Threat Intelligence: Step-by-Step
Common Security & SOC Use-Cases
Open-Source Intelligence (OSINT)
Using Splunk, Elastic Search as SOC Dashboards
Tabletop Exercises
Offensive Security
Cloud Computing Security
Firewalls, IDS, IPS, UTM, & FW Rule Management