I'm a Copywriter in a Digital Agency, I was searching for courses that'll help me broaden my skill set. Before signing up for Rob's.
SOC, SIEM
- Cyber Security, Programs
- 0 (Registered)
-
Module 01: Security Measures
The module begins with an overview of network security measures and endpoint security measures. It then discusses additional security measures that can be implemented to improve the overall security posture of an organization. The module also covers SIEM basics, SIEM logs, and SIEM monitoring.
Module 02: SIEM Solutions + Log Generation & Collection
The second module focuses on SIEM solutions and log generation and collection. The module covers SIEM operations and provides an overview of Splunk, including its configuration, logging, and filtering capabilities. The module also covers understanding system logs.
Module 03: Log Generation & Collection + Monitoring Attacks
The third module covers log generation and collection, as well as monitoring attacks. It covers the use of Windows Event Viewer, GPO configuration, endpoint security, and monitoring attacks. The module also discusses attack differentiation, correlated rules, and Windows security logs.
Module 04: Security Measures Integration – ESET + SOC Life Cycle
The fourth module covers the integration of security measures, specifically ESET and SOC lifecycle management. It provides an overview of the ESET Security Management Center (ESMC) and agent, tasks and group configuration, policy management, and mobile management. The module also
covers SOC lifecycle management and provides an introduction to SOC.
Module 05: SOC Life Cycle + Threat Hunting Through Logs
The fifth and final module covers SOC lifecycle management and threat hunting through logs. The module discusses vulnerability assessment, task management system, policy management, and mobile management. It also covers threat hunting through logs and provides an introduction to Zeek and ELK.
Summary
Overall, this course provides a comprehensive overview of cybersecurity measures, SIEM solutions, and SOC lifecycle management. The course covers various topics such as network security, endpoint security, log generation and collection, attack monitoring, and threat hunting. It also provides an introduction to various tools such as Splunk, Zeek, and ELK, which are widely used in the industry. By the end of the course, students will have gained a solid understanding of cybersecurity measures and will be equipped with the necessary skills to implement and manage SIEM solutions and SOC lifecycle management.
Instructor
0 rating
Related Courses
– Mary Kate McDevitt, Skillshare teacher with 50,000 students
Join our community of students around,the world helping you succeed.