Curriculum
- 6 Sections
- 34 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- 1.Security Operations andManagement3
- 2.Understanding Cyber Threats,IoCs, and Attack Methodology6
- 3.Incidents, Events, and Logging3
- 4.Incident Detection withSecurity Information and EventManagement (SIEM)9
- 4.1Understand the Basic Concepts of Security Information and Event Management (SIEM)
- 4.2Discuss the Different SIEM Solutions
- 4.3Understand the SIEM Deployment
- 4.4Learn Different Use Case Examples for Application Level Incident Detection
- 4.5Learn Different Use Case Examples for Insider Incident Detection
- 4.6Learn Different Use Case Examples for Network Level Incident Detection
- 4.7Learn Different Use Case Examples for Host Level Incident Detection
- 4.8Learn Different Use Case Examples for Compliance
- 4.9Understand the Concept of Handling Alert Triaging and Analysis
- 5.Enhanced Incident Detectionwith Threat Intelligence6
- 5.1Learn Fundamental Concepts on Threat Intelligence
- 5.2Learn Different Types of Threat Intelligence
- 5.3Understand How Threat Intelligence Strategy is Developed
- 5.4Learn Different Threat Intelligence Sources from which Intelligence can be Obtained
- 5.5Learn Different Threat Intelligence Platform (TIP)
- 5.6Understand the Need of Threat Intelligence-driven SOC
- 6.Incident Response7
- 6.1Understand the Fundamental Concepts of Incident Response
- 6.2Learn Various Phases in Incident Response Process
- 6.3Learn How to Respond to Network Security Incidents
- 6.4Learn How to Respond to Application Security Incidents
- 6.5Learn How to Respond to Email Security Incidents
- 6.6Learn How to Respond to Insider Incidents
- 6.7Learn How to Respond to Malware Incidents
Learn How to Respond to Insider Incidents
Prev