Intermediate
English
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC)..
Created By
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 2 Students Enrolled
- 02:30 Hours
Course Overview
CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry.
Who this course is for:
- Network Administrators
- Security Domain
What you'll learn
- Security Operations and management
- Understanding Cyber Threats, IoCs, and Attack Methodology
- Incidents, Events and Logging
- Incident Detection with Security Information and Event Management (SIEM)
- Enhanced incident Detection with Threat Intelligence
- Incident Response
Course Curriculum
Total: 21 Lessons
Time: 02:30 Hours
-
Alien Vault USM vs OSS... 00:02:28
-
Alien Vault USM vs OSSIM 00:02:28
-
Course Overview 00:10:20
-
Course Overview 00:10:20
-
Security Management 00:13:40
-
Security Management 00:13:40
-
Security Operations 00:03:24
-
Security Operations 00:03:24
-
Security Operations Ce... 00:08:01
-
Security Operations Center 00:08:01
-
Components Of SOC 00:08:29
-
Components Of SOC 00:08:29
-
Types Of SOC Models 00:02:06
-
Types Of SOC Models 00:02:06
-
SOC Generations And Im... 00:01:11
-
SOC Generations And Implementation 00:01:11
-
SOC KPI And Metrics 00:01:29
-
SOC KPI And Metrics 00:01:29
-
Best Practices 00:00:38
-
Best Practices 00:00:38
-
SOC vs NOC 00:01:38
-
SOC vs NOC 00:01:38
-
Cyber Threats 00:09:31
-
Cyber Threats 00:09:31
-
Network Level Attacks 00:32:37
-
Network Level Attacks 00:32:37
-
Host Level Attacks 00:03:21
-
Host Level Attacks 00:03:21
-
Application Level Atta... 00:15:46
-
Application Level Attacks 00:15:46
-
Indicators Of Compromi... 00:04:06
-
Indicators Of Compromise ( IoCs ) 00:04:06
-
IoCs Of Application Se... 00:07:29
-
IoCs Of Application Security Threats 00:07:29
-
IoCs Of Network Securi... 00:06:55
-
IoCs Of Network Security Threats 00:06:55
-
IoCs Of Malware Threat... 00:07:16
-
IoCs Of Malware Threats 00:07:16
-
IoCs Of Insider Threat... 00:03:23
-
IoCs Of Insider Threats 00:03:23
-
Attackers Hacking Meth... 00:06:45
-
Attackers Hacking Methodology 00:06:45
Item Reviews - 0
Submit Reviews
This Course Include:
- 02:30 Hours On-Demand Videos
- 21 Lessons
- Lifetime Access
- Access on Mobile and TV