MODULE 1:
INTRO
Lesson 1:
Introduction to SOC
Lesson 2:
Career as Cyber Security Analyst-Mindset
Lesson 3:
Security Operation Center-Team
Lesson 4:
Security Operation Analyst Responsibilities
MODULE 2:
Cyber
Defense
Frameworks
Lesson 1:
PAIN OF PYRAMID
Lesson 2:
CYBER KILL CHAIN
Lesson 3:
DIAMOND MODEL
Lesson 4:
MITRE ATT&CK
Lesson 5:
UNIFIED KILL CHAIN
Lesson 6:
Commonly used cyber defense frameworks
MODULE 3:
INTRODUCTION
TO THREAT
INTEL TOOLS
Lesson 1:
Introduction
Lesson 2:
Cyber Threat Intelligence
Lesson 3:
CTI Lifecycle
Lesson 4:
CTI Standards & Frameworks
Lesson 5:
Practical Analysis
MODULE 4:
Network
Security and
Traffic Analysis
Lesson 1:
Introduction to Network Security, Network Data, and Traffic Analysis
Lesson 2:
Network Security and Network Data
Lesson 3:
Traffic Analysis
MODULE 5:
Endpoint
Security
Lesson 1:
Introduction
Lesson 2:
Endpoint Security Fundamentals
Lesson 3:
Endpoint Login and Monitoring
Lesson 4:
Event Log Analysis
MODULE 6:
Security
Information
and Event Management
Lesson 1:
Introduction
Lesson 2:
Investigating with SIEM Tools
MODULE 7:
Phishing
Lesson 1:
Phishing Analysis
Lesson 2:
Phishing Emails in Action
Lesson 3:
Phishing Analysis Tools
Lesson 4:
Phishing Prevention
Comments are closed.