SIEM & SOC

This course provides students with the knowledge and practical training needed to design and maintain secure infrastructures. Students will also learn to implement various security countermeasures and build their knowledge base in anticipation of taking the CompTIA Security+ certification exam. The course provides an in-depth examination of the different methods of defensive infrastructure.

The curriculum focuses on how to design a secure architecture and will familiarize students with various security measures that can be used to harden networks, devices, and cloud infrastructure. Students will also learn how to work with Security Information & Event Management (SIEM) solutions, with an emphasis on Splunk, a popular open-source solution currently available on the market. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Category:

Description

Prerequisites:
-People who are already familiar with client-server communication models, networking concepts, and basic computer operations.
-People who are already familiar with the topic of potential cyber threats and security awareness.

Module-1:
Security Measures
-Network Security Measures
-Endpoint Security Measures
-Additional Security Measures
-SIEM Basics
-SIEM Logs
-SIEM Monitoring

Module-2:
SIEM Solutions + Log Generation & Collection
-SIEM Operations
-Get to Know Splunk
-Splunk Configuration
-Splunk Logging & Filtering
-Additional Splunk Abilities
-Understanding System Logs

Module-3:
Log Generation & Collection + Monitoring Attacks
-Windows Event Viewer
-GPO Configuration
-Endpoint Security
-Monitoring Attacks
-Attack Differentiation
-Corelated Rules
-Windows Security Logs

Module-4:
SIEM Solutions + Log Generation & Collection
-ESMC & Agent
-Tasks & Group Configuration
-Policy Management
-Mobile Management
-SOC Life Cycle
-Get to Know SOC

Module-5:
SOC Life Cycle + Threat Haunting Through Logs
-Vulnerability Assessment
-Task Management System
-Policy Management
-Mobile Management
-Threat Hunt Trough Logs
-Get to Know Zeek
-Get to Know ELK

Datasheets

  • Datasheet 1

Video



Categories


Partners: HackerU


Available Training: HackerU Offensive Cybersecurity