I'm a Copywriter in a Digital Agency, I was searching for courses that'll help me broaden my skill set. Before signing up for Rob's.
The module begins with an overview of network security measures and endpoint security measures. It then discusses additional security measures that can be implemented to improve the overall security posture of an organization. The module also covers SIEM basics, SIEM logs, and SIEM monitoring.
The second module focuses on SIEM solutions and log generation and collection. The module covers SIEM operations and provides an overview of Splunk, including its configuration, logging, and filtering capabilities. The module also covers understanding system logs.
The third module covers log generation and collection, as well as monitoring attacks. It covers the use of Windows Event Viewer, GPO configuration, endpoint security, and monitoring attacks. The module also discusses attack differentiation, correlated rules, and Windows security logs.
The fourth module covers the integration of security measures, specifically ESET and SOC lifecycle management. It provides an overview of the ESET Security Management Center (ESMC) and agent, tasks and group configuration, policy management, and mobile management. The module also
covers SOC lifecycle management and provides an introduction to SOC.
The fifth and final module covers SOC lifecycle management and threat hunting through logs. The module discusses vulnerability assessment, task management system, policy management, and mobile management. It also covers threat hunting through logs and provides an introduction to Zeek and ELK.
Overall, this course provides a comprehensive overview of cybersecurity measures, SIEM solutions, and SOC lifecycle management. The course covers various topics such as network security, endpoint security, log generation and collection, attack monitoring, and threat hunting. It also provides an introduction to various tools such as Splunk, Zeek, and ELK, which are widely used in the industry. By the end of the course, students will have gained a solid understanding of cybersecurity measures and will be equipped with the necessary skills to implement and manage SIEM solutions and SOC lifecycle management.
Curriculum is empty