Companies Home Search Profile

CyberSecurity : Inside a Security Operations Center

Focused View

Wassim Robbana

4:42:33

107 View
  • 1. Introduction Objectives & Plan.mp4
    04:01
  • 2. Who am I.mp4
    04:12
  • 3. First Definitions.mp4
    03:38
  • 4. Historical Timeline 1st Generation SOCs.mp4
    07:17
  • 5. Historical Timeline 2nd Generation SOCs.mp4
    05:18
  • 6. Historical Timeline 3rd Generation SOCs.mp4
    05:23
  • 7. Historical Timeline 4th Generation SOCs.mp4
    03:53
  • 8. Historical Timeline 5th Generation SOCs.mp4
    02:16
  • 9. Quiz - Section 1.html
  • 1. Service Catalog Presentation.mp4
    03:58
  • 2. Service Catalog Monitoring.mp4
    10:24
  • 3. Service Catalog Analysis & Response.mp4
    12:07
  • 4. Service Catalog Threat Intelligence.mp4
    19:52
  • 5. Live Use Case Development.mp4
    22:01
  • 6. Live Incident Response - Introduction.mp4
    03:58
  • 7. Live Incident Response - Adware on End-User Workstation.mp4
    25:34
  • 8. Live Incident Response - Threat Intelligence IoC.mp4
    13:08
  • 9. Live Incident Response - Post Intrusion Recon Command.mp4
    08:21
  • 10. Live Incident Response - DLL created through Powershell.mp4
    10:31
  • 11. Quiz - Section 2.html
  • 1. Drive Change Introduction.mp4
    03:01
  • 2. SOC Structure & Roles.mp4
    27:00
  • 3. SOC Governance.mp4
    06:49
  • 4. SOC KPIs & KRIs.mp4
    18:08
  • 5. Live Identify Gaps & Drive Change - Intro.mp4
    04:50
  • 6. Live Identify Gaps & Drive Change - Organization questionnaire.mp4
    10:36
  • 7. Live Identify Gaps & Drive Change - Architecture questionnaire.mp4
    23:18
  • 8. Live Identify Gaps & Drive Change - Incident Response questionnaire.mp4
    15:48
  • 9. Summary & Conclusion.mp4
    07:11
  • 10. Quiz - Section 3.html
  • Description


    Get a multi-level vision to bring value to any SOC

    What You'll Learn?


    • Get a comprehensive view and key elements to bring value to any SOC
    • Understand SOC Services, Processes and Operational Activities
    • Know the most used tools by SOCs, per business need
    • Be familiar with SOC diverse and new Use Cases, and learn how to build one from scratch
    • Discover Incident Response with a live demo of real-life investigations
    • Discover essentials (structure, roles, governance, vendors, trainings per role[...] ) of a SOC
    • Learn standard KPIs of a SOC and how to design a KPIs system
    • Determine the current state of a SOC and identify gaps to drive change
    • Use your learnings to drive effective change in any SOC

    Who is this for?


  • Entry-level to Experienced SOC Candidates
  • Entry-level to Experienced SOC Managers
  • SOC Steering Comitee Members
  • Any practioner who is or is looking to work in the Security Operations Center as a Service market. A multi-billion dollars market, expected to reach 83.55 billion dollars by 2028 (source : Polaris Market Research).
  • What You Need to Know?


  • No programming skills required
  • Basic technical skills
  • More details


    Description

    Get valuable knowledge and good practices proven successful in the biggest SOCs !


    The Security Operations Center market as a Service is expected to reach 83.55 billion US dollars by 2028 (source : Polaris Market Research).
    As, myself, a SOC Consultant, I daily see that demands for SOC services and practitioners are growing constantly, without enough supply, especially for job positions.


    This expanding market, along with the demand & supply gap, holds numerous opportunities for cyber security practioners, network engineers, computer scientists and even for analysts wannabees.
    This is along with the very exciting context of SOCs.
    SOC teams are striving in the biggest companies, and are responsible for major & challenging  business use cases.


    Security Operations Center is a relatively new model. And started to boom quite recently. Therefore, many of the SOC professionals have not a complete vision of their teams and models.

    This course will give you valuable key elements to grasp that vision, and thus break confidently into a SOC.


    This learning can be used as skills for managing a SOC Program. As well as comprehensive knowledge to dive into any other position in a SOC.


    For members of the community : feel free to reach out if you want to discuss this course or any other topic related to cyber security & IT.

    Who this course is for:

    • Entry-level to Experienced SOC Candidates
    • Entry-level to Experienced SOC Managers
    • SOC Steering Comitee Members
    • Any practioner who is or is looking to work in the Security Operations Center as a Service market. A multi-billion dollars market, expected to reach 83.55 billion dollars by 2028 (source : Polaris Market Research).

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Wassim Robbana
    Wassim Robbana
    Instructor's Courses
    Hello network ! I'll be brief, but please feel free to reach out if you want to know me more or would like to introduce yourself.I'm a CyberSecurity consultant with :3+ years experience in multiple multinational SOC environmentsDiverse roles : L3 SOC Analyst, SOC Trainer (Management & Technical trainings), Threat Intelligence Lead, Data Scientist, Developer [...]And a fierce determination in developing cybersecurity all around the world, and all together !
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 27
    • duration 4:42:33
    • Release Date 2022/11/26