This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Security Operations Center - SOC Analyst Training
Security Operations Center - SOC Analyst Training
1.Security Operations Center - SOC Promotional Video (0:40)
2.SOC Introduction (7:04)
3.Importance of learning SOC (4:24)
4.What curriculum is covered (7:15)
5.Security Triad- Confidentiality, Integrity & Availability (48:51)
6.Computer Network, Topologies (82:26)
7.Network Concepts (16:02)
8.OSI Continued Part 1 (40:39)
9.OSI Continued Part 2 (20:53)
10.TCPIP Protocol Suite (39:25)
11.Cybersecurity Attacks (40:21)
12.Ethical Hacking (8:21)
13.DoS DDoS (27:04)
14.SYN Flooding using Hping3 (15:23)
15.Counter Measures (10:38)
18.Cyber kill chain methodology (19:58)
16.Metasploit Test (9:43)
17. Maltego (15:29)
19.Information security vectors (15:28)
20.Ransomware (41:41)
21.Web Application Security (33:59)
22.SIEM (6:54)
23.Key Objectives (1:55)
24.Defence in Depth (4:21)
25.Corporate Environment (3:59)
26.Log Management (11:14)
27.Why is SIEM necessary (10:24)
28.Use Cases (17:02)
29.Elements of SIEM (42:10)
30.SIEM Deployment Options (28:40)
31.Splunk Introduction (25:47)
32.Splunk UI Introduction (95:47)
33.Basic Transformation Commands (7:37)
34.Creating Reports and Dashboards (23:01)
35.Saving and Sharing Reports (4:22)
36.Dashboards (9:17)
37.Creating Alerts (44:16)
38.Splunk Part 1 (75:36)
39.Splunk Part 2 (45:35)
40.Splunk Part 3 (58:39)
41.Cyber security incidence response (37:42)
42. Email SMTP, Email system, Webmail architecture (33:19)
43.Virus, other types and Anti-Virus (74:50)
44.Vulnerability Management (58:56)
39.Splunk Part 2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock