COURSE OBJECTIVE:
After completing this course you should be able to:
• Articulate SOC processes, procedures, technologies, and workflows.
• Understand and security threats, attacks,vulnerabilities, attacker's behaviors, cyber kill chain, etc.
• Recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
• Monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers and workstations).
• Apply Centralized Log Management (CLM) processes.
• Perform Security events and log collection, monitoring, and analysis.
• Understand Security Information and Event Management.
• Administer SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
• Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/ AlienVault/OSSIM/ELK).
• Gain hands-on experience on SIEM use case development process.
• Develop threat cases (correlation rules), create reports, etc.
• Recognize use cases that are widely used across the SIEM deployment.
• Plan, organize, and perform threat monitoring and analysis in the enterprise.
• Monitor emerging threat patterns and perform security threat analysis.
• Gain hands-on experience in alert triaging process.
• Escalate incidents to appropriate teams for additional assistance.
• Use a Service Desk ticketing system.
• Prepare briefings and reports of analysis methodology and results.
• Integrate threat intelligence into SIEM for enhanced incident detection and response.
• Make use of varied, disparate, constantly changing threat information.
• Articulate knowledge of Incident Response Process.
• Understand SOC and IRT collaboration for better incident response.
TARGET AUDIENCE:
SOC Analysts ( Tier I and Tier II), Cybersecurity Analysts, Entry-level cybersecurity professionals. Network and Security Administrators
COURSE PREREQUISITES:
Attendees should meet the following prerequisites:
• Network Administration or Security Domain experience
COURSE CONTENT:
SOC Essential Concepts
• Computer Network Fundamentals
• TCP/IP Protocol Suite
• Application Layer Protocols
• Transport Layer Protocols
• Internet Layer Protocols
• Link Layer Protocols
• IP Addressing and Port Numbers
• Network Security Controls
• Network Security Devices
• Windows Security
• Unix/Linux Security
• Web Application Fundamentals
• Information Security Standards, Laws and Acts
Security Operations and Management
• Security Management
• Security Operations
• Security Operations Center (SOC)
• Need of SOC
• SOC Capabilities
• SOC Operations
• SOC Workflow
• Components of SOC: People, Process and Technology
• People
• Technology
• Processes
• Types of SOC Models
• SOC Maturity Models
• SOC Generations
• SOC Implementation
• SOC Key Performance Indicators
• Challenges in Implementation of SOC
• Best Practices for Running SOC
• SOC vs NOC
Understanding Cyber Threats, IoCs and Attack Methodology
• Cyber Threats
• Intent-Motive-Goal
• Tactics-Techniques-Procedures (TTPs)
• Opportunity-Vulnerability-Weakness
• Network Level Attacks
• Host Level Attacks
• Application Level Attacks
• Email Security Threats
• Understanding Indicators of Compromise
• Understanding Attacker's Hacking Methodology
Incidents, Events and Logging
• Incident
• Event
• Log
• Typical Log Sources
• Need of Log
• Logging Requirements
• Typical Log Format
• Logging Approaches
• Local Logging
• Centralized Logging
Incident Detection with Security Information and Event Management (SIEM)
• Security Information and Event Management (SIEM)
• Security Analytics
• Need of SIEM
• Typical SIEM Capabilities
• SIEM Architecture and Its Components
• SIEM Solutions
• SIEM Deployment
• Incident Detection with SIEM
• Examples of Commonly Used Use Cases Across all SIEM deployments
• Handling Alert Triaging and Analysis
Enhanced Incident Detection with Threat Intelligence
• Understanding Cyber Threat Intelligence
• Why-Threat Intelligence-driven SOC?
Incident Response
• Incident Response
• Incident Response Team (IRT)
• Where does IRT Fit in the Organisation
• SOC and IRT Collaboraton
• Incident Response (IR) Process Overview
• Step 1: Preparation for Incident Response
• Step 2: Incident Recording and Assignment
• Step 3: Incident Triage
• Step 4: Notification
• Step 5: Containment
• Step 6: Evidence Gathering and Forensic Analysis
• Step 7: Eradication
• Step 8: Recovery
• Step 9: Post-Incident Activities
• Responding to Network Security Incidents
• Responding to Application Security Incidents
• Responing to Email Security Incidents
• Responding to Insider Incidents
• Responding to Malware Incidents
FOLLOW ON COURSES:
Not available. Please contact.