You’ll learn how to deal with the huge number of logs, alerts and events in a SOC, which can be overwhelming if not treated correctly. We’ll dive deep into the analytical process and offer you a set of hypotheses with ‘if- then’ scenario’s, what to look for and where to find ‘go- to’ resources to support your investigations. This training will trigger your curiosity, activate your analytical brain and have you work together with your SOC Mates, Clients and Incident Responders. One of the most important takeaways from this course is understanding the ‘Analyst Mindset’. You’ll use the ticketing system to report and present your findings, and manage an incident from preparation to post-incident analysis. You will monitor, analyse and prioritize SIEM alerts and perform triage and effective decision making to confirm and declare if a security incident is taking place. You’ll practice attacker techniques and vulnerabilities evaluation and identify companies’ critical assets & key IT systems that you are assigned to monitor and protect. Associate SOC Analyst offers a comprehensive 3- day training that immerses you into the processes, data flows and capabilities of a SOC along with hands on, real-world tasks of a Tier 1 Analyst: Throughout the course you’ll work with SIEM, ITSM and a SOC Ticketing System, the key toolset of the Tier 1 analyst.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |