Information and Cyber Security Literacy: Security Operations
A thorough understanding of the roles and responsibilities within a security operations center is vital to safeguarding your company’s assets.
What you'll learn
In today's interconnected world, the threat landscape looms large, with cyberattacks becoming increasingly sophisticated and prevalent. Arm yourself against this pervasive threat in this course, Information and Cyber Security Literacy: Security Operations. First, you’ll delve into the pivotal roles within a Security Operations Center (SOC). Next, you’ll dig deeper into penetration testing and discuss the roles, responsibilities, and capabilities that exist to uncover vulnerabilities before adversaries do. Lastly, you’ll discuss the benefits and strategic insights gained by threat intelligence analysis to proactively defend against emerging threats. At the end of this course, you’ll be equipped with a deeper understanding of the skills and capabilities necessary to navigate the complex terrain of cybersecurity and safeguard digital assets with confidence.
Table of contents
- Module Intro 2m
- Security Operations Center Main Roles 3m
- Security Analysts: Roles, Responsibilities and Common Tools 4m
- Incident Responders: Types and Responsibilities 3m
- Threat Hunters: Roles, Responsibilities, and Common Tools 2m
- SOC: Interconnected Roles and Responsibilities 2m
- Threat Types: Internal and External 3m
- Module Intro 2m
- Specific Types of Threats 2m
- Gathering and Correlating Information 1m
- Strategic, Tactical, and Operational Intelligence 2m
- Common Tools, SIEM Systems, and How Intelligence Adds Value 2m
- Security Operations Maturity Levels 3m
- Categories of Threat Intelligence in Industry Verticals 1m
- SOC: Interconnected Roles and Responsibilities 2m
- Demo: Enriching Alerts with Threat Intelligence 5m