Computer Network and Security Fundamentals
- TCP/IP Model
- OSI Model
- Types of a Network
- Network Topologies
- Network Hardware Components
- TCP/IP Protocol Suite
- Network Security Controls
- Network Security Devices
- Windows Security
- Unix/Linux Security
- Web Application Fundamentals
- Information Security Standards, Laws, and Acts
Fundamentals of Cyber Threats
- Cyber Threats
- Intent-Motive-Goal
- Tactics-Techniques-Procedures
- Opportunity-Vulnerability-Weakness
- Vulnerability
- Threats & Attacks
- Example of Attacks
- Network-Based Attacks
- Application-Based Attacks
- Host-Based Attacks
- Insider Attacks
- Malware
- Phishing and Social Engineering
Introduction to Security Operations Center
- What is a Security Operations Center (SOC)
- Importance of SOC
- SOC Team Roles and Responsibilities
- SOC KPI
- SOC Metrics
- SOC Maturity Models
- SOC Workflow and Processes
- Challenges in Operating a SOC
SOC Components and Architecture
- Key Components of a SOC
- People in SOC
- Process in SOC
- Technologies in SOC
- SOC Architecture and Infrastructure
- Different Types of SOCs and Their Purposes
- Introduction to SIEM
- SIEM Architecture
- SIEM Deployment Models
- Data Sources in SIEM
- SIEM Logs
- Network in SIEM
- Endpoint Data in SIEM
Introduction to Log Management
- Incident
- Event
- Log
- Typical Log Sources
- Need of Log
- Typical Log Format
- Local Log Management
- Centralized Log Management
- Logging Best Practices
- Logging/Log Management Tools
Incident Detection and Analysis
- SIEM Use Case Development
- Security Monitoring and Analysis
- Correlation Rules
- Dashboards
- Reports
- Alerting
- Triaging Alerts
- Dealing with False Positives Alerts
- Incident Escalation
- Communication Paths
- Ticketing Systems
Threat Intelligence and Hunting
- Introduction to Threat Intelligence
- Threat Intelligence Sources
- Threat Intelligence Types
- Threat Intelligence Lifecycle
- Role of Threat Intelligence in SOC Operations
- Threat Intelligence Feeds
- Threat Intelligence Sharing and Collaboration
- Threat Intelligence Tools/Platforms
- Introduction to Threat Hunting
- Threat Hunting Techniques
- Threat Hunting Methodologies
- Role of Threat Hunting in SOC Operations
- Leveraging Threat Intelligence for Hunting
- Threat Hunting Tools
Incident Response and Handling
- Incident Handling Process
- Incident Classification and Prioritization
- Incident Response Lifecycle
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Post-incident Analysis and Reporting