Course Outline
1 - Course Outline
- Understanding Risk Management and SOC Operations
- Understanding Analytical Processes and Playbooks
- Investigating Packet Captures, Logs, and Traffic Analysis
- Investigating Endpoint and Appliance Logs
- Understanding Cloud Service Model Security Responsibilities
- Understanding Enterprise Environment Assets
- Threat Tuning
- Threat Researching and Threat Intelligence Practices
- Understanding APIs
- Understanding SOC Development and Deployment Models
- Performing Security Analytics and Reports in a SOC
- Malware Forensics Basics
- Threat Hunting Basics
Target Audience
Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:
Cybersecurity engineer
Cybersecurity investigator
Incident manager
Incident responder
Network engineer
SOC analysts currently functioning at entry level with 2+ years of experience