Course Content
Course Content
- Section 1: Defining the Security Operations Center
- Section 2: Understanding NSM Tools and Data
- Section 3: Understanding Incident Analysis in a Threat-Centric SOC
- Section 4: Identifying Resources for Hunting Cyber Threats
- Section 5: Understanding Event Correlation and Normalization
- Section 6: Identifying Common Attack Vectors
- Section 7: Identifying Malicious Activity
- Section 8: Identifying Patterns of Suspicious Behavior
- Section 9: Conducting Security Incident Investigations
- Section 10: Describing the SOC Playbook
- Section 11: Understanding the SOC Metrics
- Section 12: Understanding the SOC WMS and Automation
- Section 13: Describing the Incident Response Plan
- Section 14: Appendix A –Describing the Computer Security Incident Response Team
- Section 15: Appendix B –Understanding the use of VERIS
- See fewer details
Labs Outline
This course contains 26 hands-on lab exercises. The labs included in this course are:
- Discovery Lab 2.11: Explore Network Security Monitoring Tools
- Discovery Lab 3.14: Investigate Hacker Methodology
- Discovery Lab 4.11: Hunt Malicious Traffic
- Discovery Lab 5.7: Correlate Event Logs, PCAPs, and Alerts of an Attack
- Discovery Lab 6.11: Investigate Browser-Based Attacks
- Discovery Lab 7.7: Analyze Suspicious DNS Activity
- Discovery Lab 8.6: Investigate Suspicious Activity Using Security Onion
- Discovery Lab 9.4: Investigate Advanced Persistent Threats
- Discovery Lab 10.6 Explore SOC Playbooks
+ See more details