In the Trenches: Security Operations Center
Offered By: EC-Council via Coursera
Course Description
Overview
Cyber-attacks, breaches, and incidents continue to grow. The sophistication and complexity of these attacks continue to evolve. More than ever organizations need to plan, prepare, and defend against a potential cyber incident. Security Operation Centers (SOCs) act as an organization's front-line defense against cyber incidents. SOC analyst accomplishes this by monitoring and responding to network and host anomalies, performing an in-depth analysis of suspicious events, and when necessary, aiding in forensic investigations.
This course is designed to be a primer for anyone planning on taking the EC-Council CSA course. We will discuss the structure, organization, and general daily activities of SOC analysts. We will also look at several defensive tools including SEIMs, IDS, and IPS. We will talk about event monitoring and vulnerability management. Finally, we will talk about what to expect when an incident happens.
Syllabus
- Lab Setup
- Here, you will understand the goals, objectives, and summary of the entire course. You will get to know the author, his areas of expertise and his accomplishments. In this section, you will learn how to setup the lab environment to get started.
- Enterprise Security Operations
- In this section, you will start learning about Security Operations Center. You will also learn what they are, how the functions, and what they do.
- Hacker Tactics, Techniques, and Procedures
- In this section, you will start learning about Security Operations Center. You will also learn what they are, how the functions, and what they do.
- Defensive Tools for the Modern Enterprise
- In this section, you will learn various practices that organizations use to protect their sensitive data.
- Event Monitoring and Threat Hunting
- This section will teach you some other advanced practices being followed at various organizations as their security measures.
- Vulnerability Management
- Vulnerability can be easily used to enter your organizations security systems and steal or misuse your data. We will learn about vulnerabilties in this lesson.
- Incident Response
- Incident means any situation that appears and needs attention. This section will teach you about incidents and how to deal with them
- Course Conclusion and Final Comments
- Final thoughts by the instructor
Taught by
EC-Council
Related Courses
Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)Amazon Web Services via AWS Skill Builder AWS Certified DevOps Engineer – Professional
A Cloud Guru AWS Certified DevOps Engineer - Professional 2020
A Cloud Guru CompTIA CySA+ Certification
A Cloud Guru Advanced Network Security
LearnQuest via Coursera