Security Operations Centre (SOC) Analyst Foundation

Provided by

About the course

Security operations training to help you respond to security incidents and vulnerabilities. Improve your operational security capability, leverage the security operations centre (SOC) analyst and specialist training techniques used in vulnerability management and security information event management (SIEM) platforms. Understanding the techniques provides a foundation for assessing and managing cyber risk through effective security incident triage. This course provides security operations analysts the foundation training needed to address the cyber threat lifecycle, looking at common and advanced attack vectors, detection, reporting and collaboration and simulated attack.

Prerequisites
There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management. The course is designed for individuals responsible for defending organisations from cyber attacks.

Delegates will learn how to
Security Management
Incident Response
Security Education
Security Information Event Management
Vulnerability Management
Threat Detection
Simulated Attack
Outline
Module 1 - Security Management

What is Security Operations
Finding the sweet spot
Security and Control
Security Goals
Reliability vs Security
Typical Security Flaws
Module 2 - Incident Response & Continuity Management

Incident Response vs Business Continuity
Incident Response Plans
Business Continuity Plans
Module 3 - Security Education

Implementing Security Programmes

Module 4 - Security Information Event Management

SIEM Processes & Architecture
SIEM Features & Functions
Security Auditing
Event Definition
Audit Logs - What to collect from Where
Data Analysis
Module 5 - Vulnerability Management

Vulnerability Management Process
Vulnerability Scanning
Remediation & Re-scanning
Module 6 - Threat Detection

Intruder Behaviour
IDS Systems
Anomaly Detection
HIDS & NIDS
Open Source IDS
Honeypots
Advanced Threats
Module 7 - Security Assessments

Penetration Testing
Red Teams
Scanning (NMap)
Firewall & IDS Evasion
Kali Linux
Metasploit
Meterpreter
Hydra
Social Engineering Toolkit
Module 8 - Simulated Attack - Defend - Attack

Offensive Defence Tradecracft

Related article

The Cyber Pulse is QA's new portal to free Cyber content, including on-demand webinars, articles written by leading experts,