Visão Geral
Curso Certified Analyst é o passo inicial para se juntar a um centro de operações de segurança (SOC). Permite ao candidato adquirir competências técnicas de tendência e a pedido através da instrução por alguns dos instrutores mais experientes da indústria. Abrange completamente as bases das operações SOC, antes de transmitir os conhecimentos de gestão e correlação de registos, implantação do SIEM, detecção avançada de incidentes, e resposta a incidentes. Além disso, o candidato irá descobrir como supervisionar diferentes processos SOC e colaborar com o CSIRT no momento da necessidade.
Conteúdo Programatico
Security Operations and Management
- Understand the SOC Fundamentals
- Discuss the Components of SOC: People, Processes and Technology
- Understand the Implementation of SOC
Understanding Cyber Threats, IoCs, and Attack Methodology
- Describe the term Cyber Threats and Attacks
- Understand the Network Level Attacks
- Understand the Host Level Attacks
- Understand the Application Level Attacks
- Understand the Indicators of Compromise (IoCs)
- Discuss the Attacker’s Hacking Methodology
Incidents, Events, and Logging U
- Understand the Fundamentals of Incidents, Events, and Logging
- Explain the Concepts of Local Logging
- Explain the Concepts of Centralized Logging
Incident Detection with Security Information and Event Management (SIEM)
- Understand the Basic Concepts of Security Information and Event Management (SIEM)
- Discuss the Different SIEM Solutions
- Understand the SIEM Deployment
- Learn Different Use Case Examples for Application Level Incident Detection
- Learn Different Use Case Examples for Insider Incident Detection
- Learn Different Use Case Examples for Network Level Incident Detection
- Learn Different Use Case Examples for Host Level Incident Detection
- Learn Different Use Case Examples for Compliance
- Understand the Concept of Handling Alert Triaging and Analysis
Enhanced Incident Detection with Threat Intelligence
- Learn Fundamental Concepts on Threat Intelligence
- Learn Different Types of Threat Intelligence
- Understand How Threat Intelligence Strategy is Developed
- Learn Different Threat Intelligence Sources from which Intelligence can be Obtained
- Learn Different Threat Intelligence Platform (TIP)
- Understand the Need of Threat Intelligence-driven SOC
Incident Response
- Understand the Fundamental Concepts of Incident Response
- Learn Various Phases in Incident Response Process
- Learn How to Respond to Network Security Incidents
- Learn How to Respond to Application Security Incidents
- Learn How to Respond to Email Security Incidents
- Learn How to Respond to Insider Incidents
- Learn How to Respond to Malware Incidents