Course Summary

A combination of lecture content and lab work helps attendees achieve the following:

• Discuss the Current State of Security
• Explain the Security Operations Maturity levels
• Describe Security Incident Response Components and Configuration
• Demonstrate the Baseline Security Incident Response Lifecycle
• Identify Security Incident Response Workflow-Based Responses
• Configure Vulnerability Assessment and Management Response tools
• Explore the ServiceNow Threat Intelligence application
• Employ Threat Sources and Explore Attack Modes and Methods
• Define Observables, Indicators of Compromise (IOC) and IoC Look Ups
• Discuss Security Operations Common Functionality
• Use Security Operations Integrations
• Demonstrate how to view and analyze Security Operations data

Module 1: Security Operations Overview
• Current State of Security and Security Operations Maturity Levels
• Introducing ServiceNow Security Operations
• Essential Platform and Security Administration Concepts
• Security Operations User Administration
• Security Operations Common Functionality
• Security Operations Common Functionality
• Email Parser

Module 2: Vulnerability Response
• Vulnerability Response Overview
• Explore the Vulnerability Response Application
• Vulnerability Classification and Assignment
• Explore Vulnerable Items and Vulnerability Groups
• Vulnerability Management
• Vulnerability Groups (for Grouping Vulnerable Items)
• Configuration Compliance
• Vulnerability Remediation

Module 3: Security Incident Response
• Security Incident Response Overview
• Security Incident Response Components and Configuration
• Security Incident Response Configuration
• Baseline Security Incident Response Lifecycle
• Creating Security Incidents
• Security Incident Response Workflow-Based Responses

Module 4 Threat Intelligence
• Threat Intelligence Definition
• Threat Intelligence Terminology
• Threat Intelligence Toolsets
• Review and Update an Existing Attack Mode or Method
• Working with Indicators of Compromise (IOC) Lookups
• Automated Lookups in Security Incidents
• Trusted Security Circles

Module 5: Security Operations Integrations
• Work with Security Operations
• Navigating Security Operations Integrations

Module 6: Data Visualization
• Understand Security Operations Monitoring and Reporting

Before attending this course you should have attended the ServiceNow Fundamentals course. In addition, you should be familiar with the ServiceNow user interface, know how to manage lists, and know how to configure users, roles, and groups. • ServiceNow Administration Fundamentals (SNAF)

Part of ServiceNow Certified Implementation Specialist – Vulnerability Response certification

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?