Categories
Business intelligence
Datawarehouse
Cloud
Amazon
Devops
Cyber Security
Career Oriented
CompTIA
Data Privacy
EC Council
ISACA
ISC2
ISO IEC20000
ISO IEC27001
ISO22301
ISO9001
Security Testing
SOC
IAM Tools
AWS
CA
IBM
More Courses
Ping
IT & Software
More Courses
Pega
RPA
Workday
Home
Resources
Contact Us
Sign Up
Sign Up
Course Content
1. Center for Operational Security
0/1
An Overview of SOC: • Constructing a Reliable SOC • Aspects of SOC’s Role • Socio-Security and Incident and Event Management • The “Magic Quadrant” by Gartner • Guidelines and structure for security information and event management.
00:00
2. Incident Response Domain
0/1
An Overview of Incident Response • Incident Response: What Is It? • As to Why IR is Required. • Contrast Security Events with Security Incidents • Crisis Management Process – National Institute of Standards and Technology Publication 80061r2 • The nature of this thing, and the reason for its use.
00:00
3. Digital Forensics
0/1
Incident Response: A Primer • Introduction to the Section • Definition of Digital Forensics • Evidence gathering, most often in the context of computer crime • Subject Access Requests in Digital Form Proof Documents • Introduction to Section • unstable evidence • In-Random-Access Memory (RAM), Cache, Register Content, Routing Tables, Address Resolution Protocol (ARP) Cache, Process Table, Kernel Statistics, and Swap File/Temporary File System • Magnetic Disc Testimony • Disk or Solid-State Drive • Connected Data.
00:00
4. Threat Intelligence Domain
0/1
Introduction to Section • Intelligence on Threats: An Explanation • When and when is TI useful? • Several Reasons Why Threat Intelligence Can Be Useful.
00:00
SOC Analyst Training
About Lesson
Subscribe to our newsletter
Sign up to receive updates, promotions, and sneak peeks of upcoming courses. Plus 20% off your next course.
Subscribe Now
Your information will never be shared with any third party