https://i124.fastpic.org/big/2024/1107/dc/9c3fef27ddf6bce3c9da879216a410dc.jpg
Security Operations (SOC) 101
.MP4, AVC, 1920x1080, 60 fps | English, AAC, 2 Ch | 29h 17m | 5.25 GB
Instructor: Andrew Prince

Course Overview

This course aims to equip students with all of the fundamental security operations knowledge and practical skills needed in order to achieve and excel in a T1 or T2 SOC Analyst position. By covering topics such as phishing analysis, incident response procedures, threat detection techniques, log analysis, SIEM management, and security tool utilization, students will gain the essential competencies required to effectively monitor, analyze, and respond to security incidents within a SOC environment.

Students will be able to actively engage with the course material through bite-sized video demonstrations, written materials and references, quizzes to assess comprehension, and practical exercises that simulate real-world scenarios.

By the end of the course, participants will be proficient in using various common security tools, analyzing security events and artifacts, handling alert tickets, triaging, and responding effectively to incidents within a SOC. Additionally, the course aims to foster critical thinking skills and encourage both proactive and reactive methodologies, which are pivotal for skilled analysts.

Key Topics Covered:

[list]
[*]Security Operations Fundamentals
[*]Phishing Analysis
[*]Network Security Monitoring
[*]Network Traffic Analysis
[*]Endpoint Security Monitoring
[*]Endpoint Detection and Response
[*]Log Analysis and Management
[*]Security Information and Event Management (SIEM)
[*]Threat Intelligence
[*]Digital Forensics
[*]Incident Response
[/list]

System [b]Requirements[/b]

To get the most out of this course and follow along with the labs, there will be times where two virtual machines (VMs) need to be run simultaneously. If resources are limited, you can run one VM at a time and follow along with the course. Below are the recommended (ideal) specifications. Feel free to adjust based on your own system's limitations, but these specs will ensure a smoother experience with the course labs.

Processor: 64-bit Intel i5 or i7, 2.0 GHz or higher.

RAM: At least 8 GB (ideally 8-12+ GB) to efficiently run multiple VMs.

Disk Space: 80-100 GB of free storage. SSDs are recommended for better performance.

Prerequisites

Networking Fundamentals:

[list]
[*]Basic understanding of TCP/IP and OSI models.
[*]Knowledge of network concepts such as subnets, internal vs. external IP addresses, network address translation, and routing.
[*]Familiarity with common protocols (e.g., SSH, FTP, HTTP, HTTPS).
[/list]

The foundations and network sections of the course will provide a refresher on these concepts and more, but it would be ideal to have these foundations coming into the course.

Operating System Fundamentals:

[list]
[*]Basic familiarity with Windows and Linux components.
[*]Working with the command-line and knowledge of basic commands and navigation (e.g., cd, ls, cat).
[*]Troubleshooting skills
[/list]

Basic Information Security Concepts:

[list]
[*]Understanding of foundational security concepts such as the CIA triad, security controls, encryption, and hashing.
[*]Basic security appliances and controls (e.g., firewalls, proxies, VPNs, EDR)
[/list]

The foundations section of the course will provide a comprehensive information security refresher.

SOC 101 Course Objectives

[list]
[*]Understand the foundational principles and practices of security operations.
[*]Learn techniques for analyzing and identifying phishing attacks.
[*]Develop skills in monitoring network traffic for security threats and anomalies.
[*]Develop skills in monitoring and analyzing security events on individual hosts.
[*]Learn how to effectively use a SIEM for security event correlation, analysis, and incident management.
[*]Learn how to leverage threat intelligence to enhance security operations and incident response.
[*]Develop an understanding of digital forensics processes, common tools, and methodologies.
[*]Understand the procedures, and best practices for incident response in a SOC environment.
blue laptop illustration with lock on the screen
[/list]

Who Should Take SOC 101?

This course will be aimed at individuals who are looking to pursue a career in cybersecurity (beginners with basic or little cybersecurity knowledge or experience), specifically focusing on defensive security operations within a Security Operations Center (SOC) environment.

This course aims to be extremely marketable, offering an all-encompassing curriculum and digestible content to help students secure and thrive in their first security role or advance to a T2 analyst position. The practical exercises included within the course provide students with tangible skills and experience to discuss during interviews, even if they have no direct experience in a professional SOC role.

More Info

https://images2.imgbox.com/41/40/3sw47LBR_o.jpg


DDownload

Код:
https://ddownload.com/pj2lppifgwob/TCM_Security_Security_Operations_SOC_101.part1.rar
https://ddownload.com/9e43n7jd6jly/TCM_Security_Security_Operations_SOC_101.part2.rar
https://ddownload.com/wtus4b2j9241/TCM_Security_Security_Operations_SOC_101.part3.rar

RapidGator

Код:
https://rapidgator.net/file/bcfc5e060ba92840493500ad59c03f6c/TCM_Security_Security_Operations_SOC_101.part1.rar
https://rapidgator.net/file/d41d956b952d5c9efdfbec3d84a27c5f/TCM_Security_Security_Operations_SOC_101.part2.rar
https://rapidgator.net/file/0f8f6dc673d126421054133435928c2d/TCM_Security_Security_Operations_SOC_101.part3.rar

FileStore
TurboBit

Код:
https://turbobit.net/4kc9nxdglaw0/TCM_Security_Security_Operations_SOC_101.part1.rar.html
https://turbobit.net/s016ght3rymv/TCM_Security_Security_Operations_SOC_101.part2.rar.html
https://turbobit.net/y0hjw03lek66/TCM_Security_Security_Operations_SOC_101.part3.rar.html

FileAxa

Код:
https://fileaxa.com/i1ax8lozakgq/TCM_Security_Security_Operations_SOC_101.part1.rar
https://fileaxa.com/uenjflevjhny/TCM_Security_Security_Operations_SOC_101.part2.rar
https://fileaxa.com/775v35rfhzju/TCM_Security_Security_Operations_SOC_101.part3.rar