Cyber Defense Operations 101
Learn the Core Skills Behind the Screens of a SOC. Gain the knowledge to detect, respond, and defend in real-world cyber environments with over 25 hours of training.
This course aims to equip students with all of the fundamental security operations knowledge and practical skills needed in order to achieve and excel in a T1 or T2 SOC Analyst position. By covering topics such as phishing analysis, incident response procedures, threat detection techniques, log analysis, SIEM management, and security tool utilization, students will gain the essential competencies required to effectively monitor, analyze, and respond to security incidents within a SOC environment. Students will be able to actively engage with the course material through bite-sized video demonstrations, written
materials and references, quizzes to assess comprehension, and practicalexercises that simulate real-world scenarios.
By the end of the course, participants will be proficient in using various common securitytools, analyzing security events and artifacts, handling alert tickets,
triaging, and responding effectively to incidents within a SOC. Additionally, the course aims to foster critical thinking skills and
encourage both proactive and reactive methodologies, which are pivotal for skilled analysts.
Key Topics Covered:
Security Operations Fundamentals
Phishing Analysis
Network Security Monitoring
Network Traffic Analysis
Endpoint Security Monitoring
Endpoint Detection and Response
Log Analysis and Management
Security Information and Event Management (SIEM)
Threat Intelligence
Digital Forensics
Incident Response
Prerequisites
Networking Fundamentals:
The foundations and network sections of the course will provide a refresher on these concepts and more, but it would be ideal to have these foundations coming into the course.
Operating System Fundamentals:
Basic Information Security Concepts:
The foundations section of the course will provide a comprehensive information security refresher.
Understand the foundational principles and practices of security operations.
Learn techniques for analyzing and identifying phishing attacks.
Develop skills in monitoring network traffic for security threats and anomalies.
Develop skills in monitoring and analyzing security events on individual hosts.
Learn how to effectively use a SIEM for security event correlation, analysis, and incident management.
Learn how to leverage threat intelligence to enhance security operations and incident response.
Develop an understanding of digital forensics processes, common tools, and methodologies.
Understand the procedures, and best practices for incident response in a SOC environment.
This course will be aimed at individuals who are looking to pursue a career in cybersecurity (beginners with basic or little cybersecurity knowledge or experience), specifically focusing on defensive security operations within a Security Operations Center (SOC) environment.
This course aims to be extremely marketable, offering an all-encompassing curriculum and digestible content to help students secure and thrive in their first
security role or advance to a T2 analyst position. The practical exercises included within the course provide students with tangible skills and experience to discuss during interviews, even if they have no direct experience in a professional SOC role.
The point of using dummy text for your paragraph is that it has a more-or-less normal distribution of letters. making it look like readable English.
Social Media Links:
Yes. All courses come with a 24-hour money-back guarantee.
Yes. All courses come with a certificate of completion.
We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@cyberintrusionguard.com and we will help you out.