IT-Trainer Jobs und Stellenangebote: SOC Essentials (SCE)

Seminardauer: 2 Tage

Trainer gesucht

IT-Trainer Jobs und Stellenangebote: SOC Essentials (SCE), EC-Council, IT Security, IT-Security Spezialist, Security Operations Center.

Anmelden / Registrieren als Trainer

Agenda

Computer Network and Security Fundamentals

  • Computer Network
  • TCP/IP Model
  • OSI Model
  • Types of a Network
  • Network Model
  • Network Topologies
  • TCP/IP Protocol Suite
  • Network Security Controls
  • Network Security Devices
  • Windows Security
  • Unix / Linux Security
  • Web Application Fundamentals
  • Information Security Standards, Laws and Acts

Fundamentals of Cyber Threats

  • Cyber Threats
  • Intent-Motive-Goal
  • Tactics-Techniques Procedures (TTPs)
  • Opportunity-Vulnerability-Weakness
  • Vulnerability
  • Threats & Attacks
  • Example of Attacks
  • Network-based Attacks
  • Application-based
  • Host Based Attacks
  • Insider Attacks
  • Malware (Virus, Worms, Ransomware etc.)
  • Phishing and Social Engineering

Introduction to Security Operations Center (SOC)

  • What is a Security Operations Center (SOC)
  • Importance of SOC
  • SOC Team Roles and Responsibilities
  • SOC KPI
  • SOC Metrics
  • SOC Maturity Models
  • SOC Workflow and Processes
  • Challenges in Operating a SOC

SOC Components and Architecture

  • Key Concepts of a SOC
  • People in SOC
  • Processes in SOC
  • Technologies in SOC
  • SOC Architecture and Infrastructure
  • Different Types of SOC and Their Purposes
  • Introduction to SIEM
  • SIEM Architecture
  • SIEM Deployment Models
  • Data Sources in SIEM
  • SIEM Logs
  • Network in SIEM Endpoint Data in SIEM

Introduction to Log Management

  • Incident
  • Event
  • Log Typical Log Sources
  • Need of Log
  • Typical Log Format
  • Local Log Management
  • Central Log Management
  • Logging Best Practices
  • Logging / Log Management Tools

Incident Detection and Analysis

  • SIEM Use Case Development
  • Security Monitoring and Analysis
  • Correlation Rules
  • Dashboards
  • Reporting
  • Alerting
  • Triage Alerts
  • Dealing with False Positive Alerts
  • Incident Escalation
  • Communication Paths
  • Ticketing Systems

Threat Intelligence and Hunting

  • Introduction to Threat Intelligence
  • Threat Intelligence Sources
  • Threat Intelligence Types
  • Threat Intelligence Lifecycle
  • Role of Threat Intelligence in SOC Operations
  • Threat Intelligence Feeds
  • Threat Intelligence Sharing and Collaboration
  • Threat Intelligence Tools/Platforms
  • Introduction to Threat Hunting
  • Threat Hunting Techniques
  • Threat Hunting Methodologies
  • Role of Threat Hunting in SOC Operations
  • Leveraging Threat Intelligence for Hunting
  • Threat Hunting Tools

Incident Response and Handling

  • Incident Handling Process
  • Incident Handling Classification and Prioritization
  • Incident Response Lifecycle
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Post-Incident Analysis and Reporting