9 Sections
39 Lessons
16 Weeks
Expand all sections
Collapse all sections
SOC Fundamentals
4
1.1
Introduction to Security Operations Centers
1.2
SOC Structure and Roles
1.3
SOC Operational Framework
1.4
Threat Landscape Overview
Network Security Fundamentals
4
2.1
Network Architecture and Protocols
2.2
Network Security Technologies
2.3
Network Monitoring and Analysis
2.4
Wireless Security
SIEM Platforms and Log Analysis
5
3.1
SIEM Architecture and Concepts
3.2
Log Management and Analysis
3.3
Popular SIEM Platforms
3.4
Alert Management and Tuning
3.5
Hands-on Lab Exercises
Threat Detection and Analysis
5
4.1
Threat Detection Methodologies
4.2
Malware Analysis Fundamentals
4.3
Network-based Threat Detection
4.4
Endpoint Threat Detection
4.5
Advanced Persistent Threat (APT) Detection
Incident Response and Management
6
5.1
Incident Response Framework
5.2
Incident Detection and Analysis
5.3
Containment and Eradication
5.4
Recovery and Post-Incident Activities
5.5
Communication and Coordination
5.6
Tabletop Exercises and Simulations
Security Tools and Technologies
5
6.1
Vulnerability Management
6.2
Threat Intelligence Platforms
6.3
Security Orchestration and Automated Response (SOAR)
6.4
Digital Forensics Tools
6.5
Cloud Security Monitoring
Specialized SOC Functions
4
7.1
Threat Hunting
7.2
Digital Forensics and Investigation
7.3
Threat Intelligence Analysis
7.4
Security Architecture Review
SOC Management and Leadership
5
8.1
SOC Strategy and Planning
8.2
Team Management and Development
8.3
Process Improvement and Optimization
8.4
Vendor Management and Partnerships
8.5
Compliance and Governance
Practical Application and Capstone
1
9.1
Comprehensive Lab Scenarios
Security Operations & Defense – SecOps Specialist
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Home
Courses
Search
Search
Account
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content