SOC Essentials (S|CE) Training




SOC Essentials (S|CE) Training
De S|CE training is ontworpen om u een sterke basis te geven in de technieken en tools die ethische hackers gebruiken om zwakke plekken in de beveiliging te identificeren en aan te pakken.
Lees meer- Merk:
- EC-Council
- Beschikbaarheid:
- Op voorraad
- Levertijd:
- Voor 17:00 uur besteld! Start vandaag. Gratis Verzending.
- Award Winning E-learning
- De laagste prijs garantie
- Persoonlijke service van ons deskundige team
- Betaal veilig online of op factuur
- Bestel en start binnen 24 uur
SOC Essentials (S|CE) Training
De SOC Essentials (S|CE) is ontworpen voor aankomende beveiligingsprofessionals, nieuwkomers en carrièreswitchers om inzicht te geven in raamwerken voor beveiligingsoperaties en gerelateerde technologieën. Met 8 modules die robuuste onderwerpen behandelen, van computernetwerk- en beveiligingsfundamenten tot SOC-componenten en architectuur, bereidt S|CE je voor op het identificeren van verschillende aspecten van cyberbedreigingen en het beveiligen van digitale omgevingen. Test je kennis met CTF-gebaseerde Capstone-projecten en valideer je nieuw verworven vaardigheden in gesurveilleerde examens. Verder biedt het meer dan 10 uur aan eersteklas video training in zelfstudie met 6 hands-on labs om praktijkscenario's te simuleren.
Cursusinhoud
Module 01: Computer Network and Security Fundamentals
Computer Network
TCP/IP Model
OSI Model
Types of Networks
Network Model
• Types of a Network
o Types of a Network (PAN)
o Types of a Network (LAN)
o Types of a Network (WLAN)
o Types of a Network (MAN)
o Types of a Network (WAN)
o Types of a Network (SAN)
Network Topologies
• Network Hardware Components
TCP/IP Protocol Suite
Network Security Controls
• Key Network Security Controls
Network Security Devices
Windows Security
Unix/Linux Security
Web Application Fundamentals
Information Security Standards, Laws and Acts
Module 02: Fundamentals of Cyber Threats
Cyber Threats
• Classification of Cyber Threats
• Impact of Cyber Threats
• Vulnerability in Cybersecurity
• Cybersecurity Best Practices
• Emerging Threats and Future challenges
• Ransomware
• Impact of Ransomware
Intent-Motive-Goal
• Cybercrime Performed
• Email compromise Attack
Tactics-Techniques-Procedures (TTPs)
• Example -Data Exfiltration
• Practical Example – Data Exfiltration
• Key Steps for Lateral Movement
• APT - Example
Opportunity-Vulnerability-Weakness
• Opportunity
• Vulnerability
• Weakness
• Practical Example- E-Commerce Website
• Practical Example- Online Banking System
Vulnerability
• Type of vulnerabilities
• Source of Vulnerabilities
• Lifecycle of Vulnerabilities
• Practical Example - Vulnerability
Threats & Attack
• Types of Threat & Attack
• Cyber Threat
• Mitigation strategies for Cyber Threats
Example of Attacks
• Example of Attack – Blended Cyber Attack
• Example of Attack -Man-in-the-Middle Attack for Credentials Harvesting
Network-based attacks
Application-based
• Cross-site Scripting
• Types of Cross-site Scripting
• Attack Process
• Application Based Attack
Host Based Attacks
• Host Based Attack - Impact
Insider Attacks
• Types of Insider Attacks
• Prevention and Mitigation
• Examples
Malware (viruses, worms, ransomware, etc.)
• Types of Malware
• Distribution Method
• Prevention And Mitigations
Phishing and social engineering
• Common Characteristics
• Examples
• Prevention
• Social Engineering Common Characteristics
• Example
• Prevention
• Key Difference
Module 03: Introduction to Security Operations Center (SOC)
What is a Security Operations Center (SOC)?
Importance of SOC
• Importance of SOC in Cybersecurity
SOC Team Roles & Responsibilities
SOC KPI
SOC Metrics
SOC Maturity Models
• Typical Stages in the SOC Maturity Model
• Benefits of the SOC Maturity Model
SOC Workflow and Processes
Challenges in Operating a SOC
Module 04: SOC Components and Architecture
Key Components of a SOC
• Security Operation Center
• Breakdown of the Key Components of the SOC
People in SOC
Processes in SOC
• Key Processes in SOC
• Example of Processes in SOC
Technologies in SOC
• Key Technology in SOC
SOC Architecture and Infrastructure
• Key Components of SOC Architecture and Infrastructure
Different Types of SOC and Their Purpose
Introduction to SIEM
• Key components of SIEM
• Benefits of SIEM
• Challenges of SIEM
• Use Cases of SIEM
SIEM Architecture
• Key Components of SIEM Architecture
• SIEM Architecture
SIEM Deployment Model
Data Sources in SIEM
SIEM Logs
• Overview of Logs in SIEM Environment
Networking in SIEM
Endpoint Data in SIEM
Module 05: Introduction to Log Management
Incident
• Example of Cybersecurity Incidents
Event
• Example of Cybersecurity Events
Log
• Key points of Logs
• Example of Log Types
Typical Log Sources
• Typical Log Sources with Example
Need of Log
Typical Log Format
Local Log management
• Benefits of Local Log Management
Centralized Log Management
• Key Components of Centralized Log Management
Logging Best Practices
Logging/Log Management Tools
Module 06: Incident Detection and Analysis
SIEM Use Cases Development
Security Monitoring and analysis
• Basic Concept of Security Monitoring
• Basic Concept of Security Analysis
• Security Monitoring and Analysis Process
• Practical Example – Malware Detection and Analysis
• Practical Example – Abnormal or non-typical user Behavior Detection
• Practical Example – Phishing Attack Detection and Response
Correlation Rules
• Overview of Correlation Rules
• Use cases: Detection of a Distributed Denial of Service (DDoS) Attack
Dashboards
• Overview of Dashboards
Reports
• Key Components of Reports
• Types of Reports
• Benefits of Reports
Alerting
• Purpose of Alerting
• Key components of Alerting
• Type of Alerts
• Alerting Workflow
• Benefits of Alert
Triaging alerts
• Purpose of Triaging alerts
• Key components of Triaging alerts
• Triage Process
• Benefits of Triaging alerts
Dealing with False Positive Alerts
• Mitigation strategies
• Final step in Dealing with False positive Alerts
Incident Escalation
• Purpose of Incident Escalation
• Key Components of Incident Escalation
• Escalation Process
• Benefits of Incident Escalation
Communication Paths
• Common Communication paths in cybersecurity
Ticketing Systems
• Example of Ticketing Systems
Module 07: Threat Intelligence and Hunting
Introduction to Threat Intelligence
• Breakdown of Threat Intelligence
Threat Intelligence Sources
Threat Intelligence Types
Threat Intelligence Lifecycle
Role of Threat Intelligence in SOC operations
Threat Intelligence Feeds
• Types of Threat Intelligence Feeds
• Content and Format
• Integration and consumption
• Evaluation and Selection
Threat Intelligence Sharing and Collaboration
• Types of Threat Intelligence Sharing
• Benefits of Threat Intelligence sharing
• Challenges and Considerations
Threat Intelligence Tools/Platforms
• Malware Analysis Platform
• Open-Source Intelligence Tools
• Vulnerability Management Tools
• Threat Intelligence Feeds and APIs
• Dark Web Monitoring Tools
• Adversary Emulation Platforms
Introduction to threat Hunting
Threat Hunting Techniques
• Common Threat threat-hunting techniques
Threat Hunting Methodologies
• Common Threat Hunting Methodologies
Role of Threat Hunting In SOC Operations
Leveraging Threat Intelligence for Hunting
Threat Hunting Tools
Module 08: Incident Response and Handling
Incident Handling Process
• Steps in the Incident Handling Process
Incident classification and prioritization
• Breakdown of Incident Classification
Incident response lifecycle
• Preparation
• Detection & Analysis
• Containment, Eradication & Recovery
• Post-Incident Analysis
• Continuous Improvement
Preparation
Identification
Containment
Eradication
Recovery
Post-Incident Analysis and Reporting
Lesduur | 15:06:25 |
---|---|
Taal | Engels |
Certificaat van deelname | Ja |
Online toegang | 1 jaar onbeperkte toegang |
Voortgangsbewaking | Ja |
Er zijn nog geen reviews geschreven over dit product.
OEM Office Elearning Menu Top 2 in ICT-trainingen 2024!
OEM Office Elearning Menu is trots op de tweede plaats in de categorie ICT-trainingen 2024 bij Beste Opleider van Nederland (Springest/Archipel). Dank aan al onze cursisten voor hun vertrouwen!
Beoordelingen
Er zijn nog geen reviews geschreven over dit product.