YoVDO

Building a Cyber Security Operations Center - DefCamp 2015

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cybersecurity Courses Change Management Courses Incident Response Courses Data Aggregation Courses Infrastructure Security Courses Data Recovery Courses

Course Description

Overview

Explore the essential components and challenges of establishing a Cyber Security Operations Center in this DefCamp 2015 conference talk. Delve into key objectives, recovery times, compliance frameworks, and data aggregation strategies. Learn about critical success factors, change management processes, and infrastructure requirements. Discover the importance of asset repositories, threat cases, and offensive naming conventions. Gain insights into effective incident response techniques and methods for assessing security maturity. Enhance your understanding of cybersecurity operations and best practices in this comprehensive presentation from one of Central and Eastern Europe's most significant hacking and information security conferences.

Syllabus

Introduction
Challenges
Objectives
Recovery Times
Compliance Framework
Data aggregation
Key success factors
Change management
Processes
Data Recovery
Infrastructure
Asset Repository
Threat Cases
Offensive Naming Convention
Sock
Incident Response
Security Maturity


Taught by

DefCamp

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network