Price:
$4,295.00
Days:
1
Virtual
– • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
– • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
– • Explain the data that is available to the network security analyst.
– • Describe the basic concepts and uses of cryptography.
– • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
– • Understand common endpoint security technologies.
– • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
– • Identify resources for hunting cyber threats.
– • Explain the need for event data normalization and event correlation.
– • Identify the common attack vectors.
– • Identify malicious activities.
– • Identify patterns of suspicious behaviors.
– • Conduct security incident investigations.
– • Explain the use of a typical playbook in the SOC.
– • Explain the use of SOC metrics to measure the effectiveness of the SOC.
– • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
– • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
– • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.
• Familiarity with Ethernet and TCP/IP networking
• Working knowledge of the Windows and Linux operating systems
• Familiarity with basics of networking security concepts
• Defining the Security Operations Center
• Understanding Network Infrastructure and Network Security Monitoring Tools
• Exploring Data Type Categories
• Understanding Basic Cryptography Concepts
• Understanding Common TCP/IP Attacks
• Understanding Endpoint Security Technologies
• Understanding Incident Analysis in a Threat-Centric SOC
• Identifying Resources for Hunting Cyber Threats
• Understanding Event Correlation and Normalization
• Identifying Common Attack Vectors
• Identifying Malicious Activity
• Identifying Patterns of Suspicious Behavior
• Conducting Security Incident Investigations
• Using a Playbook Model to Organize Security Monitoring
• Understanding SOC Metrics
• Understanding SOC Workflow and Automation
• Describing Incident Response
• Understanding the Use of VERIS
• Understanding Windows Operating System Basics
• Understanding Linux Operating System Basics
• Lab Outline
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.