Cyber Security-SOC and SIEM (SPLUNK&ELK) for Beginners -2024
- Description
- Curriculum
- FAQ
- Reviews
A SOC is a centralized unit within an organization that is responsible for monitoring, analyzing, and responding to security-related events and incidents. The SOC team is responsible for detecting and responding to security threats in real-time and works to prevent security breaches and minimize the impact of incidents that do occur.
A SOC analyst is a member of a SOC team who is responsible for monitoring and analyzing security events and alerts.
The analyst uses a variety of tools and techniques, such as security information and event management (SIEM) systems, intrusion detection systems (IDS), and endpoint detection and response (EDR) tools, to detect potential security incidents.
SOC analysts must have a strong understanding of security concepts, such as network security, access control, and incident response, as well as the ability to analyze and interpret security data.
They must also be able to work collaboratively with other members of the SOC team, including incident responders and security engineers, to investigate and respond to security incidents.
Overall, SOC analysts play a critical role in an organization’s security posture, helping to protect sensitive data and systems from cyber threats.
This course helps you to learn and implement those strategies and with training provided. This will in turn help you play a significant role in defending against cyber threats and keeping sensitive information secure.
-
1Instructor IntroductionVideo lesson
-
2Course ContentVideo lesson
-
3Includes New Content: Explore Our Latest TopicsVideo lesson
-
4Unlocking Better LearningVideo lesson
-
5Introduction to Cyber securityVideo lesson
-
6Three Pillars of Cyber securityVideo lesson
-
7Major Cyber ThreatsVideo lesson
-
8What is SOC in Cyber securityVideo lesson
-
9What is SOC Team and SOC roles and responsibilities. SOC modelsVideo lesson
-
10SOC Analyst Entry Level Trainings and Certifications & job demandVideo lesson
-
11What Is a Computer Network and What Are the Types of Computer Networks?Video lesson
-
12OSI Layers (Open Systems Interconnection) and FunctionsVideo lesson
-
13TCP &UDP,TCP-3 way Handshake, Wireshark Packet CapturingVideo lesson
-
14Introduction to IP addresses and classes of IP addressesVideo lesson
-
15Concept of MAC addressVideo lesson
-
16IP and MAC With real-time Scenario ExampleVideo lesson
-
17What is DHCP and How it works?Video lesson
-
18What is DNS server and How it works?Video lesson
-
19DNS Quick recap and DNS RecordsVideo lesson
-
20What is SMTP and How it works? Different Protocols and Theirs port numbersVideo lesson
-
21Network Security Components-1Video lesson
-
22Network Security Components-2Video lesson
-
23Important fields in Network security Components for Log analysisVideo lesson
-
27What is PhishingVideo lesson
-
28Categories of PhishingVideo lesson
-
29What Is Email and How Does Email Communication Operate?Video lesson
-
30Email Header Basics: Unveiling the Different PartsVideo lesson
-
31Understanding SPF, DKIM, and DMARC for Secure Email CommunicationVideo lesson
-
32What Is an Email Gateway and What Functions Does It ServeVideo lesson
-
33Analysis of Phishing Email ContentVideo lesson
-
34Analyzing the Header of a Phishing EmailVideo lesson
-
46What is SIEM in SOC and Popular vendors in SIEMVideo lesson
-
47Splunk Architecture and ComponentsVideo lesson
-
48Splunk Enterprise Home lab Overview and Log SearchVideo lesson
-
49Splunk Enterprise Home lab Overview and Log Search (2)Video lesson
-
50Splunk Incident Investigation : Attack ScenarioVideo lesson
-
51Splunk Incident Investigation: Perform Attack InvestigationVideo lesson
External Links May Contain Affiliate Links read more