Course Description
This training program is the first step to joining a security operation center (SOC). It is engineered for current aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate level operations. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. A training program thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT when needed.
You’ll Learn These Core Skills:
- Fundamentals of Security Operations and Management
- Logging and event analysis techniques
- Effective utilization of SIEM tools for incident detection
- Integration of threat intelligence to enhance detection capabilities
- Strategic incident response planning and execution
- Collaboration with SOC teams and CSIRT
Attendees Should Meet the Following Prerequisites:
- Basic understanding of computer networks and cybersecurity concepts
- Familiarity with operating systems, including Windows and Linux
- Awareness of common cyber threats and attack vectors
- Passion for cybersecurity and a willingness to learn
Who Should Attend?
- Aspiring SOC Analysts (Tier I and Tier II)
- IT professionals transitioning into cybersecurity roles
- Incident response team members
- Cybersecurity enthusiasts looking to enter SOC environments
Course Modules:
- Security Operations and Management
- Understanding Cyber Threats, IoCs, and Attack Methodology
- Incidents, Events, and Logging
- Incident Detection with Security Information and Event Management (SIEM)
- Enhanced Incident Detection with Threat Intelligence
- Incident Response