Course Summary
After taking this course, you will be able to:
• Describe and implement a Cisco-recommended structured design methodology
• Describe and implement industry standards, amendments, certifications, and Requests For Comments (RFCs)
• Describe and implement Cisco enhanced wireless features
• Describe and implement the wireless design process
• Describe and implement specific vertical designs
• Describe and implement site survey processes
• Describe and implement network validation processes
Module 1: SOC Operations and Responsibilities
• Types of SOC Service Coverage: Learn about different SOC service models, including monitoring, detection, and response.
• Operational Responsibilities: Understand the roles and duties within a SOC, including incident handling, forensics, and threat intelligence.
Module 2: Cloud Security Operations
• Cloud Security Considerations: Compare security operations across various cloud platforms (public, private, hybrid).
• Cloud Platform Challenges: Discuss unique security challenges and solutions specific to cloud environments.
Module 3: SOC Platform Management
• SOC Development and Management: Explore methodologies for developing and managing SOC platforms.
• Automation in SOC: Understand how automation and orchestration tools enhance SOC efficiency and response capabilities.
Module 4: Asset Controls and Protections
• Segmentation and Micro-Segmentation: Describe techniques for asset segmentation, network segregation, and micro-segmentation.
• Zero Trust Security: Explain Zero Trust principles and how they apply to asset protection and network security.
Module 5: Incident Investigation and Core Security Technologies
• Incident Investigation Tools: Learn to use SIEM and SOAR for effective incident investigation and management.
• Core Security Technology Platforms: Understand different security technologies for monitoring, investigation, and response.
Module 6: Threat Detection and Analysis
• Threat Detection Strategies: Analyze threat detection approaches and strategies during monitoring and response.
• Indicators of Compromise and Attack: Identify and interpret IOCs and IOAs.
• Attack Analysis and Anomalous Behavior: Interpret attack sequences and analyze anomalous user and entity behavior (UEBA).
Other Popular Courses
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM
Nutanix Multicloud Infrastructure Design (NMC...
- Duration: 1 Days
- Language: English
- Level: Advanced
- Exam: Nutanix Certifi