After completing this course you should be able to:
Attendees should meet the following prerequisites:
Recommended prerequisites:
Defining the Security Operations Center
Understanding Network Infrastructure and Network Security Monitoring Tools
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Understanding Common TCP/IP Attacks
Understanding Endpoint Security Technologies
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalization
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Conducting Security Incident Investigations
Using a Playbook Model to Organize Security Monitoring
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Describing Incident Response
Understanding the Use of VERIS
Understanding Windows Operating System Basics
Understanding Linux Operating System Basics
Labs