CSA – Certified SOC Analyst Training in Pune/ Online
Duration of Training : 32 Hours
Batch type : Weekdays/Weekends
Mode of Training : Classroom/Online/Corporate Training
Module 1 – Security Operations and Management
-
- Understand the SOC Fundamentals
- Discuss the Components of SOC: People, Processes and Technology
- Understand the Implementation of SOC
Module 2 – Understanding Cyber Threats, IoCs, and Attack Methodology
-
- Describe the term Cyber Threats and Attacks
- Understand the Network Level Attacks
- Understand the Host Level Attacks
- Understand the Application Level Attacks
- Understand the Indicators of Compromise (IoCs)
- Discuss the Attacker’s Hacking Methodology
Module 3 – Incidents, Events, and Logging
-
- Understand the Fundamentals of Incidents, Events, and Logging
- Explain the Concepts of Local Logging
- Explain the Concepts of Centralized Logging
Module 4 – Incident Detection with Security Information and Event Management (SIEM)
-
- Understand the Basic Concepts of Security Information and Event Management (SIEM)
- Discuss the Different SIEM Solutions
- Understand the SIEM Deployment
- Learn Different Use Case Examples for Application Level Incident Detection
- Learn Different Use Case Examples for Insider Incident Detection
- Learn Different Use Case Examples for Network Level Incident Detection
- Learn Different Use Case Examples for Host Level Incident Detection
- Learn Different Use Case Examples for Compliance
- Understand the Concept of Handling Alert Triaging and Analysis
Module 5 – Enhanced Incident Detection with Threat Intelligence
-
- Learn Fundamental Concepts on Threat Intelligence
- Learn Different Types of Threat Intelligence
- Understand How Threat Intelligence Strategy is Developed
- Learn Different Threat Intelligence Sources from which Intelligence can be Obtained
- Learn Different Threat Intelligence Platform (TIP)
- Understand the Need of Threat Intelligence-driven SOC
Module 6 – Incident Response
-
- Understand the Fundamental Concepts of Incident Response
- Learn Various Phases in Incident Response Process
- Learn How to Respond to Network Security Incidents
- Learn How to Respond to Application Security Incidents
- Learn How to Respond to Email Security Incidents
- Learn How to Respond to Insider Incidents
- Learn How to Respond to Malware Incidents