Get in Touch

Course Outline

Security Management & Education

  • Security Management: The CIA Triad, defense-in-depth, and Zero Trust principles.
  • SOC Structure: Roles and responsibilities (L1 Triage vs. L2 Triage vs. Threat Hunters).
  • Security Education: The "Human Firewall."
    • Strategies for phishing awareness campaigns.
    • Conducting simulated social engineering tests.
    • Lab 1: Reviewing a "bad email" phishing simulation report and drafting a user advisory.

Security Information & Event Management (SIEM)

  • Security Information: Understanding logs (Windows Event Logs, Syslog, Firewall logs).
  • Event Management:
    • Filtering noise vs. signal.
    • Understanding correlation rules.
    • Log retention policies and compliance.
  • Lab 2: Ingesting log data into a SIEM (Splunk/Elastic) and running basic searches.

Vulnerability Management & Threat Detection

  • Vulnerability Management:
    • The vulnerability lifecycle (Discovery, Classification, Remediation).
    • Using scanners (Nessus/OpenVAS) effectively.
    • Patch management strategies.
  • Threat Detection:
    • Indicators of Compromise (IoC) vs. Indicators of Attack (IoA).
    • The Cyber Kill Chain & MITRE ATT&CK framework basics.
    • Network traffic analysis (Wireshark basics: spotting anomalies).
  • Lab 3: Scanning a vulnerable VM with OpenVAS and analyzing network traffic for a simulated C2 handshake.

Incident Response & Simulated Attack Capstone

  • Incident Response (IR) Lifecycle (NIST):
    • Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned.
    • Forensic basics: preserving evidence (Chain of Custody).
  • Simulated Attack (Live Lab):
    • Participants act as the SOC team while the instructor (or automated tool) executes a simulated attack (e.g., ransomware simulation or brute force attack).
    • Tasks: Detect the attack via logs, isolate the host, and recover the system.
  • Debrief: Post-incident analysis and gap identification.
  • Lab 4: Capstone Event: Respond to a multi-stage attack simulation using the full IR lifecycle.

Requirements

Target Audience

  • Security Analysts (L1/L2)
  • System Administrators transitioning into Security roles
  • IT Professionals responsible for organizational defenses
  • CISOs/Managers seeking technical grounding
 7 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories