- Introduction to organization Network
- Introduction to organization Network
- ISO Model - Application and Presentation Layer Basics
- ISO Model - Session, Transport, Network, and DataLink Layer Basics
- ISO Model Recap AND Public/Private Address Range
- Introduction to web technology
- Understanding HTTP protocol Part 1
- Understanding HTTP Part 2 and Understanding Service Ports Part 1
- Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.
- Introduction to Windows - Types of Wiondows OS and Permissions
- Windows OS - Computer Management, Utilities
- Indept on Port Numbers - Part 1
- Indept on Port Numbers - Part 2
Cyber Security SOC Analyst Training - SIEM (Splunk)
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
An analyst at the Security Operation Center is in charge of all activities that take place within the SOC. Security operations analysts collaborate with security engineers and SOC managers to provide situational awareness by detecting, containing, and dealing with IT threats. SOC analysts investigate and respond to unknown hardware and software flaws. Raghavendra Boya - Certified Security Specialist & Instructor created the Cyber Security SOC Analyst Training - SIEM (Splunk) - [2022] online certification, which is offered through Udemy.
Cyber Security SOC Analyst Training - SIEM (Splunk) - [2022] online course is designed for students who want to certify themselves as well as improve their knowledge and abilities to become SOC analysts by using a practical grasp of networking, cyber security, and the SOC process. SOC Analyst Training in Cyber Security - SIEM (Splunk) - [2022] online classes contain 87.5 hours of extensive video-based lectures which include topics like SIEM, Splunk, logs, dashboards, alerts, incident handling, and threat handling which are important in protecting against cyber threats and keeping sensitive information secure.
The highlights
- Certificate of completion
- Self-paced course
- 87.5 hours of pre-recorded video content
- 18 downloadable resource
Program offerings
- Online course
- Learning resources. 30-day money-back guarantee
- Unlimited access
- Accessible on mobile devices and tv
Course and certificate fees
Fees information
certificate availability
Yes
certificate providing authority
Udemy
Who it is for
What you will learn
After completing the Cyber Security SOC Analyst Training - SIEM (Splunk) - [2022] certification course, students will receive practical knowledge of SIEM Splunk techniques and approaches for cyber security and SOC processes. Students will explore the fundamentals of networking and security operation centres. Students will learn about logs, dashboards, and alerts, among other features of SIEM. Students will also learn how to work with incident management and threat detection.
The syllabus
Course Introduction
Networking Concepts
Cyber Security Concepts
- introduction to Security CIA Encryption and Hashing
- Defence InDeapth Approach
- Cyber Kill chain OR Phases of Attack.mp4
- Brute Force Attack and Types
- Phishing and Spoofing Attacks
- DNS Tunneling Attack
- Malware and its Types
- OWASP Top 10
Understanding Splunk, SIEM and SOC Process
- Splunk installation
- Splunk Universal Forward Installation
- Introduction to Splunk
- SOC Process
- SOC Roles and Responsibilities
- SIEM Architecture
Understanding Various Logs, Dashboard and Alert creations
- Uploading Demo Logs to Splunk and firewall Log analysis
- Understanding Firewall Logs
- Splunk Dashboard creation - Firewall Part 1
- Splunk Dashboard creation - Firewall Part 2
- IDS Log Analysis
- DNS Profiling Scenarios Part 1
- DNS Profiling Scenarios Part 2
- Understanding DNS Logs
- Understanding HTTP Logs Part 1
- Understanding HTTP Logs Part 2
- Understanding Windows Log
- Understanding Window Event IDs
- Windows Sysmon Log Analysis
- Understanding Antivirus Logs
Walkthrough SIEM usecases and Incident Handling Stages
- SIEM Use cases Part 1
- SIEM Use cases Part 2
- SIEM Use cases Part 3
- Malware outbreak Analysis
- Incident Handling stages
Introduction to threat Hunting
- Threat Hunting - Scanning attack on Web Server
- Threat Hunting - Brute Force Attack
- Email Header Analysis