Price:
$4,195.00
Days:
1
Virtual
– • Describe the types of service coverage within a SOC and operational responsibilities associated with each.
– • Compare security operations considerations of cloud platforms.
– • Describe the general methodologies of SOC platforms development, management, and automation.
– • Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
– • Describe Zero Trust and associated approaches, as part of asset controls and protections.
– • Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
– • Use different types of core security technology platforms for security monitoring, investigation, and response.
– • Describe the DevOps and SecDevOps processes.
– • Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
– • Describe API authentication mechanisms.
– • Analyze the approach and strategies of threat detection during monitoring, investigation, and response.
– • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
– • Interpret the sequence of events during an attack based on analysis of traffic patterns.
– • Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
– • Analyze anomalous user and entity behavior (UEBA).
– • Perform proactive threat hunting following best practices.
• Familiarity with the Splunk search and navigation functions
• Basic understanding of scripting using one or more of Python, JavaScript, PHP, or similar
• Familiarity with UNIX/Linux shells (bash, csh) and shell commands
• SOC Operations and Processes
• Threat Investigations
• Threat Hunting and Incident Response
• Lab Outline
• Performing Incident Investigation and Response
• Threat Hunting Basics
• Malware Forensics Basics
• Understanding SOC Development and Deployment Models
• Performing Security Analytics and Reports in a SOC
• Understanding Risk Management and SOC Operations
• Investigating Endpoint and Appliance Logs
• Investigating Packet Captures, Logs, and Traffic Analysis
• Understanding Analytical Processes and Playbooks
• Understanding APIs
• Implementing Threat Tuning
• Threat Research and Threat Intelligence Practices
• Understanding Enterprise Environment Assets
• Understanding Cloud Service Model Security Responsibilities
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.