Security Operations Centre (SOC) Analyst Foundation
Course
In London-City
Description
-
Type
Course
-
Location
London-city
Security operations training to help you respond to security incidents and vulnerabilities. Improve your operational security capability, leverage the security operations centre (SOC) analyst and specialist training techniques used in vulnerability management and security information event management (SIEM) platforms. Understanding the techniques provides a foundation for assessing and managing cyber risk through effective security incident triage. This course provides security operations analysts the foundation training needed to address the cyber threat lifecycle, looking at common and advanced attack vectors, detection, reporting and collaboration and simulated attack. Learning Objectives Delegates will learn how to Security ManagementIncident ResponseSecurity EducationSecurity Information Event ManagementVulnerability ManagementThreat DetectionSimulated Attack
Facilities
Location
Start date
Start date
About this course
There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management. The course is designed for individuals responsible for defending organisations from cyber attacks.
Reviews
Subjects
- Event Management
Course programme
Module 1 - Security Management
- What is Security Operations
- Finding the sweet spot
- Security and Control
- Security Goals
- Reliability vs Security
- Typical Security Flaws
Module 2 - Incident Response & Continuity Management
- Incident Response vs Business Continuity
- Incident Response Plans
- Business Continuity Plans
Module 3 - Security Education
Implementing Security Programmes
Module 4 - Security Information Event Management
- SIEM Processes & Architecture
- SIEM Features & Functions
- Security Auditing
- Event Definition
- Audit Logs - What to collect from Where
- Data Analysis
Module 5 - Vulnerability Management
- Vulnerability Management Process
- Vulnerability Scanning
- Remediation & Re-scanning
Module 6 - Threat Detection
- Intruder Behaviour
- IDS Systems
- Anomaly Detection
- HIDS & NIDS
- Open Source IDS
- Honeypots
- Advanced Threats
Module 7 - Security Assessments
- Penetration Testing
- Red Teams
- Scanning (NMap)
- Firewall & IDS Evasion
- Kali Linux
- Metasploit
- Meterpreter
- Hydra
- Social Engineering Toolkit
Module 8 - Simulated Attack - Defend - Attack
- Offensive Defence Tradecracft
Security Operations Centre (SOC) Analyst Foundation
