Course Summary

Whether you’re involved in cyber defense operations, building a SOC from the ground up, or enhancing your existing SOC with improved data, workflows, and analysis techniques, this training course is the ideal choice. This course offers an in-depth exploration of the mission and mindset of modern cyber defense operations, empowering participants to become the next generation of blue team professionals.

Key Topics Covered:

SOC monitoring and incident response using incident management systems, threat intelligence platforms, and SIEMs
Analyzing and defending against the most common enterprise-targeted attacks
Designing, automating, and enriching security operations to enhance efficien

Analytic Design and Tuning
The candidate will understand how to design, enhance, test, share, and continuously improve analytics.

Blue Team Defense Concepts
The candidate will be able to explain the purpose of a SOC/Blue Team, its role in managing organizational risk, and common methods for SOC monitoring and incident response.

Endpoint Defense
The candidate will be familiar with common endpoint attacks, how to defend against them, and how endpoint devices log events.

HTTP(S) Analysis and Attacks
The candidate will understand how to identify and defend against common attacks targeting HTTP(S) traffic.

Interpreting Events
The candidate will be able to identify common events in Windows and Linux systems, locate and interpret them in logs, and extract information from potentially malicious files.

Intrusion Triage and Analysis
The candidate will understand how to prioritize security incidents, incorporating organizational factors into analysis and response.

Network Traffic Analysis
The candidate will have a high-level understanding of enterprise network architecture and monitoring, be able to review network traffic, and identify and defend against DNS attacks.

Operational Improvement
The candidate will understand how to enhance Blue Team operational efficiency through task automation, response orchestration, and staff training.

Protocol Attacks and Analysis
The candidate will understand the purpose of common network protocols (such as SMTP, SMB, DHCP, ICMP, FTP, and SSH), typical attack tactics, and how to defend against them.

SOC Management Systems
The candidate will be familiar with the role and function of common Incident Management Systems, Threat Intelligence Platforms, and SIEMs.

This course has no formal prerequisites; however, a basic understanding of TCP/IP and general operating system fundamentals is recommended.

proctored exam 75 questions 2 hours Minimum passing score of 67%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?