Price
Duration
Delivery
Course OCourse Objectives:
Course Objectives:
– Understand the fundamentals of computer networks.
– Explore in-depth the concepts of cyber threats, including threats, vulnerabilities, and attacks.
– Gain a comprehensive understanding of Security Operations Center (SOC) architecture, importance, workflow, and processes.
– Comprehend advanced architectural concepts such as SIEM architecture and deployment models.
– Learn about log management and its components, including events, logs, and incidents.
– Acquire the skills to perform centralized management of logs.
– Gain knowledge in creating and interpreting dashboards, reports, and incident escalation to handle real positive and false alerts effectively.
– Discover the sources, types, and lifecycle of threat intelligence and get introduced to threat hunting.
– Deep dive into the incident response lifecycle.
Curriculum
- 1 Section
- 1 Lesson
- Lifetime
Requirements
- This course has no prerequisites.
Target audiences
- This course is suitable for school students, graduates, professionals, career starters and changers, and IT/Technology/Cybersecurity teams with little or no work experience. It is for anyone interested in starting a career in cybersecurity and those specifically interested in the Security Operations Center (SOC). Additionally, this course is beneficial for IT professionals, SOC analysts, system security professionals, security engineers, threat management professionals, incident response teams, security administrators, vulnerability management professionals, and any cybersecurity professional.