Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 152654419

SOC Essentials (S|CE) Training

Item number: 152654419

SOC Essentials (S|CE) Training

275,00 332,75 Incl. tax

S|CE training is designed to give you a strong foundation in the techniques and tools ethical hackers use to identify and address security vulnerabilities.

Read more
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

SOC Essentials (S|CE) Training

The SOC Essentials (S|CE) is designed for aspiring security professionals, freshers, and career switchers to provide insights into security operations frameworks and related technologies. With 8 modules covering robust topics from the computer network and security fundamentals to SOC components and architecture, S|CE prepares you to identify various aspects of cyber threats and secure digital environments. Test your learnings with CTF-based Capstone Projects and validate your newly acquired skills in proctored exams. Further, it provides 10+ hours of premium self-paced video training with 6 hands-on labs to simulate realworld scenarios.

Course content

Module 01: Computer Network and Security Fundamentals

Computer Network
TCP/IP Model
OSI Model
Types of Networks
Network Model

          • Types of a Network
                  o Types of a Network (PAN)
                  o Types of a Network (LAN)
                  o Types of a Network (WLAN)
                  o Types of a Network (MAN)
                  o Types of a Network (WAN)
                  o Types of a Network (SAN)

Network Topologies
          • Network Hardware Components

TCP/IP Protocol Suite
Network Security Controls
         • Key Network Security Controls

Network Security Devices
Windows Security
Unix/Linux Security
Web Application Fundamentals
Information Security Standards, Laws and Acts

Module 02: Fundamentals of Cyber Threats

Cyber Threats
         • Classification of Cyber Threats
         • Impact of Cyber Threats
         • Vulnerability in Cybersecurity
         • Cybersecurity Best Practices
         • Emerging Threats and Future challenges
         • Ransomware
         • Impact of Ransomware

Intent-Motive-Goal
         • Cybercrime Performed
         • Email compromise Attack

Tactics-Techniques-Procedures (TTPs)
         • Example -Data Exfiltration
         • Practical Example – Data Exfiltration
         • Key Steps for Lateral Movement
         • APT - Example

Opportunity-Vulnerability-Weakness
         • Opportunity
         • Vulnerability
         • Weakness
         • Practical Example- E-Commerce Website
         • Practical Example- Online Banking System

Vulnerability
         • Type of vulnerabilities
         • Source of Vulnerabilities
         • Lifecycle of Vulnerabilities
         • Practical Example - Vulnerability

Threats & Attack
         • Types of Threat & Attack
         • Cyber Threat
         • Mitigation strategies for Cyber Threats

Example of Attacks
         • Example of Attack – Blended Cyber Attack
         • Example of Attack -Man-in-the-Middle Attack for Credentials Harvesting

Network-based attacks
Application-based
         • Cross-site Scripting
         • Types of Cross-site Scripting
         • Attack Process
         • Application Based Attack

Host Based Attacks
         • Host Based Attack - Impact

Insider Attacks
         • Types of Insider Attacks
         • Prevention and Mitigation
         • Examples

Malware (viruses, worms, ransomware, etc.)
         • Types of Malware
         • Distribution Method
         • Prevention And Mitigations

Phishing and social engineering
         • Common Characteristics
         • Examples
         • Prevention
         • Social Engineering Common Characteristics
         • Example
         • Prevention
         • Key Difference

Module 03: Introduction to Security Operations Center (SOC)

What is a Security Operations Center (SOC)?
Importance of SOC
         • Importance of SOC in Cybersecurity

SOC Team Roles & Responsibilities
SOC KPI
SOC Metrics
SOC Maturity Models

         • Typical Stages in the SOC Maturity Model
         • Benefits of the SOC Maturity Model

SOC Workflow and Processes
Challenges in Operating a SOC

Module 04: SOC Components and Architecture

Key Components of a SOC
         • Security Operation Center
         • Breakdown of the Key Components of the SOC

People in SOC
Processes in SOC
         • Key Processes in SOC
         • Example of Processes in SOC

Technologies in SOC
         • Key Technology in SOC

SOC Architecture and Infrastructure
         • Key Components of SOC Architecture and Infrastructure

Different Types of SOC and Their Purpose
Introduction to SIEM
         • Key components of SIEM
         • Benefits of SIEM
         • Challenges of SIEM
         • Use Cases of SIEM

SIEM Architecture
         • Key Components of SIEM Architecture
         • SIEM Architecture

SIEM Deployment Model
Data Sources in SIEM
SIEM Logs

         • Overview of Logs in SIEM Environment

Networking in SIEM
Endpoint Data in SIEM

Module 05: Introduction to Log Management

Incident
         • Example of Cybersecurity Incidents

Event
         • Example of Cybersecurity Events

Log
         • Key points of Logs
         • Example of Log Types

Typical Log Sources
         • Typical Log Sources with Example

Need of Log
Typical Log Format
Local Log management

         • Benefits of Local Log Management

Centralized Log Management
         • Key Components of Centralized Log Management

Logging Best Practices
Logging/Log Management Tools

Module 06: Incident Detection and Analysis

SIEM Use Cases Development
Security Monitoring and analysis

         • Basic Concept of Security Monitoring
         • Basic Concept of Security Analysis
         • Security Monitoring and Analysis Process
         • Practical Example – Malware Detection and Analysis
         • Practical Example – Abnormal or non-typical user Behavior Detection
         • Practical Example – Phishing Attack Detection and Response

Correlation Rules
         • Overview of Correlation Rules
         • Use cases: Detection of a Distributed Denial of Service (DDoS) Attack

Dashboards
         • Overview of Dashboards

Reports
         • Key Components of Reports
         • Types of Reports
         • Benefits of Reports

Alerting
         • Purpose of Alerting
         • Key components of Alerting
         • Type of Alerts
         • Alerting Workflow
         • Benefits of Alert

Triaging alerts
         • Purpose of Triaging alerts
         • Key components of Triaging alerts
         • Triage Process
         • Benefits of Triaging alerts

Dealing with False Positive Alerts
         • Mitigation strategies
         • Final step in Dealing with False positive Alerts

Incident Escalation
         • Purpose of Incident Escalation
         • Key Components of Incident Escalation
         • Escalation Process
         • Benefits of Incident Escalation

Communication Paths
         • Common Communication paths in cybersecurity

Ticketing Systems
         • Example of Ticketing Systems

Module 07: Threat Intelligence and Hunting

Introduction to Threat Intelligence
         • Breakdown of Threat Intelligence

Threat Intelligence Sources
Threat Intelligence Types
Threat Intelligence Lifecycle
Role of Threat Intelligence in SOC operations
Threat Intelligence Feeds

         • Types of Threat Intelligence Feeds
         • Content and Format
         • Integration and consumption
         • Evaluation and Selection

Threat Intelligence Sharing and Collaboration
         • Types of Threat Intelligence Sharing
         • Benefits of Threat Intelligence sharing
         • Challenges and Considerations

Threat Intelligence Tools/Platforms
         • Malware Analysis Platform
         • Open-Source Intelligence Tools
         • Vulnerability Management Tools
         • Threat Intelligence Feeds and APIs
         • Dark Web Monitoring Tools
         • Adversary Emulation Platforms

Introduction to threat Hunting
Threat Hunting Techniques
         • Common Threat threat-hunting techniques

Threat Hunting Methodologies
         • Common Threat Hunting Methodologies

Role of Threat Hunting In SOC Operations
Leveraging Threat Intelligence for Hunting
Threat Hunting Tools

Module 08: Incident Response and Handling

Incident Handling Process
         • Steps in the Incident Handling Process

Incident classification and prioritization
         • Breakdown of Incident Classification

Incident response lifecycle
         • Preparation
         • Detection & Analysis
         • Containment, Eradication & Recovery
         • Post-Incident Analysis
         • Continuous Improvement

Preparation
Identification
Containment
Eradication
Recovery
Post-Incident Analysis and Reporting

Lesson duration Variable
Language English
Certificate of participation Yes
Online access 1 year unlimited access
Progress monitoring Yes

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.

Reviews

There are no reviews written yet about this product.

25.000+

Springest: 9.1 - Edubookers 9.0

3500+

20+