Use code COURSEFARM to get 30% OFF on all products!
SOC Analyst Cyber Security Training On SIEM – Vikram Saini
Original price was: $99.00.$36.00Current price is: $36.00.
Delivery : Digital Download Immediately
- Description
- Reviews (0)
Description
SOC Analyst Cyber Security Training On SIEM – Vikram Saini
What is SOC Analyst Training ?
- The organizations are providing SOC services to others companies and Organization has started there own SOC Operation.
- SOC stands for Security Operation Center which used to monitor and respond to the cyber attack on their company network.
- SOC Analyst (Person) will be responsible to work on SIEM (Security tool) for monitoring, analyzing and remediation
What you will learning in the Training
- Become The SOC BOSS In SOC Operation
- TCP/IP Procotol Suites with the Detailed summary of Headers in Data Packet
- UseCases based on the Industry Standards, Helps Student to understand the attack which helps in the identification, Investigation, and Remediation of Cyber Attacks
- Network and Security Device Working, Cyber attacks and Remediation
- Application attacks Identification, Investigation and Recommended solution
- Windows Domain Controller working and solution for the cyber attack on Authentication and Exploitation.
- Threat Hunting with the IOC’s
- SIEM Architecture and Correlation Rule
- SIEM Dashboard creation and usage in the investigation
- This course will be helpful for those who want to get a good job and knowledge in Cyber Security to earn money.
Training Benefits
- SIEM Tool Experiecne – Learn the tool on which most of the cybersecurity professionals are working.
- Real Time Attack Investigaiton – Handle the real challenge faced by SOC Analyst professionals in their job responsibilities.
- Interview Prepartion – Answer the scenario based interview question from our training.
- Life-Time Training Access – Access to our training on your device (Mobile, Laptop, Tablet etc.) anytime anywhere.
- Learn From Basic to Advacned – Learn the technology on which cybersecurity works and step followed by professionals to stop and prevent attacks in real time
Course Curriculum
Module 1: Basics of Network
- Introduction (4:16)
- What is Networking (3:36)
- Types of Network Device and Working (2:50)
- OSI Model & TCP IP Protocol (4:20)
- Types of Network Security Devices and Working (3:45)
Module 2 Understanding of Bit/Bytes in Packets
- Bit, Hexadecimal & Bytes Representation (7:14)
- MAC Address & IP Address (7:41)
- Port Address Translation (1:59)
- Network Address Translation (2:16)
- Basics of Wireshark & Tshark (8:25)
Module 3 : Internet Layer, Transport Layer & Cyber Attacks on IP Layer
- What is the Internet Layer & IP Header (2:12)
- What are the IP Header Fields (12:55)
- What is the Transport Layer & TCP Header (6:56)
- What are the Transport Header Fields (1:36)
- Cyber attacks performed with Transport Layer (7:17)
UDP & ICMP Protocol & Cyber Attacks on Protocols
- What is UDP Protcol & UDP Header (1:19)
- What are the UDP Header Fields (1:34)
- What is the ICMP Protocol & ICMP Header (1:32)
- What are the ICMP Header Fields (2:26)
- Cyber Attacks Performed with ICMP Protocol (5:51)
Module 5 : Network Ports, Protocols & Services
- Protocols v/s Ports (2:49)
- ARP Protocol (1:21)
- Client-Server Model (1:01)
- What Is HTTP & How does it works (4:53)
- What is DHCP & How does it works (1:32)
- What is DNS & How does it works (3:22)
- Basics of FTP, Telnet, SSH & SMTP (0:01)
Module 6 : Security Operation USECASES for Cyber attack on Networks
- DNS Zone Transfer Attack and Remediation (4:57)
- Host Disovery Attcack and Remediation (6:45)
- Vulnerabilty Scanning Attack and Remediation (3:44)
- Cyber Attacks & Prevention for Port Scanning (6:31)
- Cyber Attack of ARP Poisiong (4:46)
- DOS/DDOS Attack and Remediation (9:49)
Module 7 : Working of Windows Domain Controller & Linux
- Workgroup & Domain (6:19)
- Cryptography (6:20)
- Windows password (4:39)
- Linux Basics (4:39)
- Windows Authentication (11:43)
- Windows & Linux Logs (5:50)
Module 8 : System Infection, Brute Force & Vulnerability Exploitation
- Malware Types (5:13)
- System Exploitation (7:31)
- Brute Force Attack (7:13)
Module 9 : Security Operation Centre USECASE on User Account & System
- Brute Force Attack – Part 2 & Remediation (2:39)
- Brute Force Attack – Part 1 & Remediation (6:23)
- Privilege Escalation attack & Remediation (2:07)
- Phishing Attack & Remediation (5:24)
- Malware Detection & Remediation (4:26)
- Multiple Geo Location Access & Remediation (2:08)
- Zero Day Attack & Remediation (2:26)
Module 10 : Web Application Working
- Web Application Attack (8:26)
- Web Application Working (3:07)
Module 11 : Cyber Attacks on Web Application/Servers
- Poodle Attack (4:11)
- Shellshock Attack (2:08)
- Heart bleed Attack (2:42)
Module 12 : Security Operation Center USECASE on Web Applicaiton
- SQL injection attack & remediation (5:43)
- CSRF Attack & remediation (1:57)
- XSS Attack & remediation (4:43)
Module 13 : Antivirus Working, Types & USECASES
- Antivirus Working & Detection (8:50)
- USECASE – Virus Outbreak (8:51)
- Conficker Worm (4:36)
- Ransomware (4:38)
Module 14 : IDS – Working, Detection & Evasion
- Working, Detection & Evasion (24:28)
Module 15 : Firewall Working, Types & Reporting
- Working, Types and Reporting (9:30)
Module 16 : Attacking Phases
- Real Time Attack with Detail Information About All Phases (65:10)
Module 17: SIEM
- Logs Forwarding to SIEM (12:51)
- SIEM Hunting For Logs (15:02)
- SIEM Dashboard Usage & Creation (28:48)
- SIEM Installation (8:29)
Reviews
There are no reviews yet.