The Modern SOC (Security Operations Center)
What you'll learn
- Understand What a SOC Is
- Understand what a SOC does
- Understand what skills are needed in a SOC
- Understand common Technology and Use-Cases that a SOC uses
Requirements
- Understand security concepts
- Understand SOC concepts
- Understand Cyber and Business Risk Management
- You don't need to be an expert as this course will teach you the fundamentals of a modern SOC
Description
This course will teach you how to effectively manage your organization's security operations, identify potential threats, and respond to security incidents.
Who is this course for?
This course is designed for security professionals, IT managers, and anyone interested in SOC operations. Whether new to the field or looking to refresh your skills, this course will provide the knowledge and tools you need to succeed.
What will you learn?
The fundamentals of SOC operations
How to identify and respond to security threats
Best practices for managing security incidents
How to effectively communicate with stakeholders
Course features
Self-paced learning: Learn at your own pace and on your schedule.
Interactive modules: Engage with the material through interactive exercises and quizzes.
Real-world examples: Learn from real-world examples and case studies.
Expert instructors: Learn from experienced instructors with experience in the field.
Chapters in this course
Introduction
Emerging Threat Landscape
Implementing Cyber Risk Management
Classifying Info and Data, DLP
Compliance and Governance
Security, Privacy & Reg. Compliance Controls
Access Controls, IAM & PAM
The MITRE Att@ck Framework
Defining a Security Operations Center
Personnel Development, Retention, & Attracting Talent
Process
Procedures
Dashboards & Use-Cases
Automation
Continuous Training
Secure Code Review & Application Security
Security Monitoring
Introduction To Threat-Hunting
Threat-Hunting, Step-by-Step
Threat Intelligence: Intelligence Lifecycle
Threat Intelligence: Step-by-Step
Common Security & SOC Use-Cases
Open-Source Intelligence (OSINT)
Using Splunk, Elastic Search as SOC Dashboards
Tabletop Exercises
Offensive Security
Cloud Computing Security
Firewalls, IDS, IPS, UTM, & FW Rule Management
Who this course is for:
- Security Analysts
- SOC Members
- SOC Managers
- CISOs
- People interested in working in Security or a SOC
Instructor
Hi, my name is Mike and I have been working in the IT and Security space for more than 30 years. As a result of this long time in the security and technology industry I have amassed more than 15 separate certifications ranging from CISSP to more specific ones like SIEM Engineer. My academic life has seen multiple degrees and research as well from the apprenticeship all the way up to Doctoral Research for Heriot Watt University in Edinburgh and my Masters at Ulster University in Ireland.
I am an author of 5 books in English and 3 in German as well as multiple articles, reports and papers on topics ranging from Cyberbullying in Social Networks up to and including Nation State Cyber Warfare and Espionage.
Health-wise I have completed my Trainer Certification as well as Meditation, Fitness Instructor and also Tai-Chi Qi Gong training for relaxation, anti stress and other forms of holistic health practices.
My specialities are Security, Cybersecurity, Cyber Risk, Intelligence, IT Technologies, Stress, Risk Management, Business Leadership, Business Management / Economics, Doctoral Research, and Holistic Health.