Course Summary
This course will help you:
• Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
• Configure common tools and platforms used by security operation teams via practical application
• Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
• Prepare for the 350-201 CBRCOR core exam
Module 1: SOC Operations and Responsibilities
Types of SOC Service Coverage: Learn about different SOC service models, including monitoring, detection, and response.
Operational Responsibilities: Understand the roles and duties within a SOC, including incident handling, forensics, and threat intelligence.
Module 2: Cloud Security Operations
Cloud Security Considerations: Compare security operations across various cloud platforms (public, private, hybrid).
Cloud Platform Challenges: Discuss unique security challenges and solutions specific to cloud environments.
Module 3: SOC Platform Management
SOC Development and Management: Explore methodologies for developing and managing SOC platforms.
Automation in SOC: Understand how automation and orchestration tools enhance SOC efficiency and response capabilities.
Module 4: Asset Controls and Protections
Segmentation and Micro-Segmentation: Describe techniques for asset segmentation, network segregation, and micro-segmentation.
Zero Trust Security: Explain Zero Trust principles and how they apply to asset protection and network security.
Module 5: Incident Investigation and Core Security Technologies
Incident Investigation Tools: Learn to use SIEM and SOAR for effective incident investigation and management.
Core Security Technology Platforms: Understand different security technologies for monitoring, investigation, and response.
Module 6: Threat Detection and Analysis
Threat Detection Strategies: Analyze threat detection approaches and strategies during monitoring and response.
Indicators of Compromise and Attack: Identify and interpret IOCs and IOAs.
Attack Analysis and Anomalous Behavior: Interpret attack sequences and analyze anomalous user and entity behavior (UEBA).
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM