Course curriculum

    1. Objectives

    1. Basics

    2. What is a security operation center (SOC)

    3. Why do we need a SOC

    4. How to deploy a SOC

    5. Quiz

    1. Introduction

    2. Network perimeter security

    3. Host-based intrusion detection and prevention systems (HIDS/HIPS)

    4. Web application firewall (WAF)

    5. Endpoint detection and response (EDR)

    6. Extended detection and response (XDR)

    7. Web proxy

    8. Vulnerability management process

    9. Security information and event management (SIEM)

    10. Security orchestration, automation and response (SOAR)

    11. Malware analysis

    12. Honeypots

    13. Cloud access security brokers (CASB)

    14. Cyber threat intelligence (CTI)

    15. User and entity behavior analytics (UEBA)

    16. Ticketing systems

    17. Asset inventory

    18. Attention to buzzwords

    1. Organization chart and roles

    2. Growth, skill development, and training plans

    3. Challenges for SOC jobs

    1. Policies, processes and procedures

    2. Standard operations procedures (SOPs)

About this course

  • Who should attend:
  • • SOC analyst

    • incident response team

    • security professional who want to fill the gaps in their understanding of technical information security

    • operations personnel who do not have security as their primary job function but need an understanding of security to be effective
  • What you will learn:

    • how compliance requirements and policies can empower your organization's security

    • know and understand the principal tools a SOC is using

    • why and how processes and procedures will leverage your SOC maturity

    • hiring skilled SOC analysts is crucial

    • awareness about the SOC alert fatigue problem

Discover your potential, starting today