SOC Operation, Investigation and Response

This intermediate level course guides cyber security professionals on how to effectively use best practices to secure information systems and mitigate risks that rise due to cyber threats. The concept around security operations center is a contemporary measure to protect cyber systems from breach of confidentiality, integrity and availability.

SOC Training is one of the most important elements to build a Quality Security Operation Center team to fight against advanced threats that target the organization network. Sophisticated detection and prevention technologies are mandatory implementations by the security experts since the cyber-attacks are rising day by day. That is why implementing dedicated SOC operation and having a SOC analyst team that are able to work in different categories to be able to handle incidents. SOC is a team primarily composed of security analysts organized to detect, analyze, respond, report, and prevent cybersecurity incidents.

course syllabus

  • Network Basics
  • Attack Vector
  • Attack Types
  • Hashing
  • Encryption
  • Security Principles
  • Network Architecture
  • Security Devices
  • Linux
  • Windows
  • Active Directory
  • Exchange
  • Important log Sources to monitor
  • Risk Analysis
  • SEIM solutions & it’s function
  • SIEM - Q-Radar Training
  • Uses Cases
  • Automation & Analysis Tools
  • Incident handling
  • Investigation and Monitoring techniques
  • Sources & Tips for investigation
  • Project

Who should attend?

  • SOC Analysts (Tier I and Tier II)
  • Cybersecurity Analyst
  • Information Security professionals
  • Cyber security analysts responsible for defending organizations from cyber-attacks.

Apply Now