See how Insoft Services is responding to COVID-19

SECOPS 1.0 – Implementing Cisco Cybersecurity Operations

X

Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Cursusplanning

  Nov 23 - Nov 27, 2020
Online

  Mar 1 - Mar 5, 2021
Online

  May 31 - Jun 4, 2021
Online

  Sep 6 - Sep 10, 2021
Online

  Nov 29 - Dec 3, 2021
Online

  • 5 Dagen
    Network Security

    Classroom + Online

    Course Details

    Cursusbeschrijving

    This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

    Doelstellingen

    Upon completion of this course, you will be able to:

    • Define a SOC and the various job roles in a SOC
    • Understand SOC infrastructure tools and systems
    • Learn basic incident analysis for a threat centric SOC
    • Explore resources available to assist with an investigation
    • Explain basic event correlation and normalization
    • Describe common attack vectors
    • Learn how to identifying malicious activity
    • Understand the concept of a playbook
    • Describe and explain an incident respond handbook
    • Define types of SOC Metrics
    • Understand SOC Workflow Management system and automation

    Inhoud

    Module 1: SOC Overview

    • Lesson 1: Defining the Security Operations Center
    • Lesson 2: Understanding NSM Tools and Data
    • Lesson 3: Understanding Incident Analysis in a Threat-Centric SOC
    • Lesson 4: Identifying Resources for Hunting Cyber Threats

     

    Module 2: Security Incident Investigations

    • Lesson 1: Understanding Event Correlation and Normalization
    • Lesson 2: Identifying Common Attack Vectors
    • Lesson 3: Identifying Malicious Activity
    • Lesson 4: Identifying Patterns of Suspicious Behavior
    • Lesson 5: Conducting Security Incident Investigations

     

    Module 3: SOC Operations

    • Lesson 1: Describing the SOC Playbook
    • Lesson 2: Understanding the SOC Metrics
    • Lesson 3: Understanding the SOC WMS and Automation
    • Lesson 4: Describing the Incident Response Plan
    • Lesson 5: Appendix A—Describing the Computer Security Incident Response Team
    • Lesson 6: Appendix B—Understanding the use of VERIS

    Doelgroep

    • Security Operations Center – Security Analyst
    • Computer/Network Defense Analysts
    • Computer Network Defense Infrastructure Support Personnel
    • Future Incident Responders and Security Operations Center (SOC) personnel
    • Students beginning a career, entering the cybersecurity field
    • Cisco Channel Partners

    Voorkennis

    It is recommended, but not required, that students have the following knowledge and skills:

    • Skills and knowledge equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1)
    • Working knowledge of the Windows operating system
    • Working knowledge of Cisco IOS networking and concepts