All courses
All courses
Course categories
Contact us

Implementing Cisco Cybersecurity Operations, 5 days

Delivered at your office or a training centre, in groups or 1-2-1

This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level. Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

Check availability in your area…

Key features

  • Live instructor-led course with 30 hours of training
  • Session runs from 9.30–5pm with normal breaks included
  • Fully certified trainer
  • Get key skills and practical knowledge
  • This course is available for delivery at your office, 1-2-1 and groups – contact us
  • Course materials included
  • Recognised course certificate

What will I learn?

Upon completion of this course, you will be able to:

Define a SOC and the various job roles in a SOC
Understand SOC infrastructure tools and systems
Learn basic incident analysis for a threat centric SOC
Explore resources available to assist with an investigation
Explain basic event correlation and normalization
Describe common attack vectors
Learn how to identifying malicious activity
Understand the concept of a playbook
Describe and explain an incident respond handbook
Define types of SOC Metrics
Understand SOC Workflow Management system and automation
Course Content
Module 1: SOC Overview

Lesson 1

: Defining the Security Operations Center

I found the pace perfect for the group as we all had differing levels of experience”

Karen C

Lesson 2

: Understanding NSM Tools and Data

Lesson 3

: Understanding Incident Analysis in a Threat-Centric SOC

Lesson 4

: Identifying Resources for Hunting Cyber Threats
Module 2: Security Incident Investigations

Lesson 1

: Understanding Event Correlation and Normalization

Lesson 2

: Identifying Common Attack Vectors

Lesson 3

: Identifying Malicious Activity

Lesson 4

: Identifying Patterns of Suspicious Behavior

Lesson 5

: Conducting Security Incident Investigations
Module 3: SOC Operations

Lesson 1

: Describing the SOC Playbook

Lesson 2

: Understanding the SOC Metrics

Lesson 3

: Understanding the SOC WMS and Automation

Lesson 4

: Describing the Incident Response Plan

Lesson 5

: Appendix A—Describing the Computer Security Incident Response Team

Lesson 6

: Appendix B—Understanding the use of VERIS

 

Download course details as a PDF

Interested in this course? Get in touch...

Call:
01225 308979

Email:
info@go.courses

Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
London
United Kingdom
EC1V 2NX

Registered Office:
Go Courses Ltd.
10 Laura Place
Bath
United Kingdom
BA2 4BL

View on a map

Blog

6 challenges of being a CISO - and which training courses will help?

Security breaches are a business owner’s worst nightmare and each year it’s becoming more important to protect data against cyber threats. As we move into 2020 there are a number of challenges that a CISO will likely face. Here are the top 5 challenges facing a CISO and the training options available.

Blog

General security training - what type of cyber security training do you need? Part 3

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 2

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 1

No business is safe from cybercrime, and cyberattacks can happen when you least expect it. But having the right training can prevent or fix all kinds of nightmare issues. Read on for a brief overview of 5 different cyber security courses available, so you can choose the right training course for you or your team members.

Blog

What type of cyber security training do you need? An overview of 10 types of cyber security training

Go.Courses have sourced dozens of the best cyber security training to help you if you’re an IT manager, the network infrastructure manager and everything in between. Read on for a brief overview of ten of our cyber security training course options.

Blog

Is Microsoft Azure Certification worth it?

With Microsoft Azure Certification, technology professionals are more likely to get hired, demonstrate clear business impact, and advance their careers. Microsoft Azure courses are available in locations all over the UK. Here’s an overview of the Microsoft Azure Solutions Architect Technologies AZ-300 course which will help you achieve Azure Certification.

Delighted satisfaction rating