This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SOC Analyst Interview Preparation - Question & Answers
01 - Introduction
001 Introduction (6:41)
02 - Networking Interview Questions
001 what are networking devices (19:56)
002 what is P address and IP address classification (22:50)
003 What is NAT and PAT (13:45)
004 Tell me few port numbers which you know (22:01)
005 How a Firewall Works (2:51)
006 How VPN works (5:17)
007 What is Symmetric and Asymmetric Encryption (19:55)
008 Explain CIA triad (12:35)
009 What is the difference in between SSL and HTTPS (2:22)
010 How do you stay up to date on Cyber Security news and latest attacks (11:09)
011 What is the difference between Virus and Warm (3:22)
012 Explain SQL Injection Attack (9:24)
013 What is botnet (4:36)
014 What is Brute Force Attack (22:09)
03 - Additional Material on Networking and Security
001 Collection of Networking Interview Questions (63:49)
002 Security Interview Questions - Part 1 (75:13)
003 Security Interview Questions - Part 2 (26:50)
004 Security Interview Questions - Part 3 (63:57)
005 Security Interview Questions - Part 4 (62:44)
04 - SIEM Data Source Types and Logs
001 SIEM related interview topics (81:34)
002 SIEM Dashboard and Use cases (108:10)
003 What are different event logs you analyze (18:05)
05 - SOC Process and Day to Day Activities
001 What is Security Operation Center (11:19)
002 What are various Security Devices used in your orrganization (39:53)
003 How does a SOC Team manage or work in an Organization (26:23)
004 What are the Roles and Responsibilities of SOC Engineer (30:37)
005 what is your SOC Team Model (17:43)
006 What are the fields in Sample Incident Ticket - ServiceNow (21:39)
007 what are Service level Agreements for the SOC Incidents (9:04)
008 What is False Positive Analysis or what are various outcomes of Analysis (18:02)
009 How many Logs sources are there in your organization (9:01)
010 What are the steps in Incident Response Life Cycle (23:53)
011 Can you please explain what you will do after getting an alert (Alert IR FLow) (10:33)
012 How will you manage work in shifts (11:28)
013 How do you handle P1, P2, P3 and P4 Incidents (14:46)
06 - SOC - Incident Analysis for various Alert Scenarios
001 How do you analyze if receive a Brute Force Attack Alert (19:56)
002 what will you do if receive a Malware Attack Alert (30:58)
003 How do you analyze Phishing email attack (42:11)
004 How do you Analyze SQL Injection attack (19:54)
005 How do you analyze DDOS Attack (18:33)
006 How do you analyze if a suspicious IP detected in outbound traffic (4:56)
38783204-GMT20220114-023122-Recording-1920x1080 (42:11)
001 SIEM related interview topics
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock