Course Summary
A combination of lecture content and lab work helps attendees achieve the following:
• Discuss the Current State of Security
• Explain the Security Operations Maturity levels
• Describe Security Incident Response Components and Configuration
• Demonstrate the Baseline Security Incident Response Lifecycle
• Identify Security Incident Response Workflow-Based Responses
• Configure Vulnerability Assessment and Management Response tools
• Explore the ServiceNow Threat Intelligence application
• Employ Threat Sources and Explore Attack Modes and Methods
• Define Observables, Indicators of Compromise (IOC) and IoC Look Ups
• Discuss Security Operations Common Functionality
• Use Security Operations Integrations
• Demonstrate how to view and analyze Security Operations data
Module 1: Security Operations Overview
• Current State of Security and Security Operations Maturity Levels
• Introducing ServiceNow Security Operations
• Essential Platform and Security Administration Concepts
• Security Operations User Administration
• Security Operations Common Functionality
• Security Operations Common Functionality
• Email Parser
Module 2: Vulnerability Response
• Vulnerability Response Overview
• Explore the Vulnerability Response Application
• Vulnerability Classification and Assignment
• Explore Vulnerable Items and Vulnerability Groups
• Vulnerability Management
• Vulnerability Groups (for Grouping Vulnerable Items)
• Configuration Compliance
• Vulnerability Remediation
Module 3: Security Incident Response
• Security Incident Response Overview
• Security Incident Response Components and Configuration
• Security Incident Response Configuration
• Baseline Security Incident Response Lifecycle
• Creating Security Incidents
• Security Incident Response Workflow-Based Responses
Module 4 Threat Intelligence
• Threat Intelligence Definition
• Threat Intelligence Terminology
• Threat Intelligence Toolsets
• Review and Update an Existing Attack Mode or Method
• Working with Indicators of Compromise (IOC) Lookups
• Automated Lookups in Security Incidents
• Trusted Security Circles
Module 5: Security Operations Integrations
• Work with Security Operations
• Navigating Security Operations Integrations
Module 6: Data Visualization
• Understand Security Operations Monitoring and Reporting
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM