Certified SOC Analyst (CSA)
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC)..

Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 2 Students Enrolled
- 02:30 Hours

Course Overview
CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry.
Who this course is for:
- Network Administrators
- Security Domain
What you'll learn
- Security Operations and management
- Understanding Cyber Threats, IoCs, and Attack Methodology
- Incidents, Events and Logging
- Incident Detection with Security Information and Event Management (SIEM)
- Enhanced incident Detection with Threat Intelligence
- Incident Response
Course Curriculum
-
Alien Vault USM vs OSS... 00:02:28
-
Alien Vault USM vs OSSIM 00:02:28
-
Course Overview 00:10:20
-
Course Overview 00:10:20
-
Security Management 00:13:40
-
Security Management 00:13:40
-
Security Operations 00:03:24
-
Security Operations 00:03:24
-
Security Operations Ce... 00:08:01
-
Security Operations Center 00:08:01
-
Components Of SOC 00:08:29
-
Components Of SOC 00:08:29
-
Types Of SOC Models 00:02:06
-
Types Of SOC Models 00:02:06
-
SOC Generations And Im... 00:01:11
-
SOC Generations And Implementation 00:01:11
-
SOC KPI And Metrics 00:01:29
-
SOC KPI And Metrics 00:01:29
-
Best Practices 00:00:38
-
Best Practices 00:00:38
-
SOC vs NOC 00:01:38
-
SOC vs NOC 00:01:38
-
Cyber Threats 00:09:31
-
Cyber Threats 00:09:31
-
Network Level Attacks 00:32:37
-
Network Level Attacks 00:32:37
-
Host Level Attacks 00:03:21
-
Host Level Attacks 00:03:21
-
Application Level Atta... 00:15:46
-
Application Level Attacks 00:15:46
-
Indicators Of Compromi... 00:04:06
-
Indicators Of Compromise ( IoCs ) 00:04:06
-
IoCs Of Application Se... 00:07:29
-
IoCs Of Application Security Threats 00:07:29
-
IoCs Of Network Securi... 00:06:55
-
IoCs Of Network Security Threats 00:06:55
-
IoCs Of Malware Threat... 00:07:16
-
IoCs Of Malware Threats 00:07:16
-
IoCs Of Insider Threat... 00:03:23
-
IoCs Of Insider Threats 00:03:23
-
Attackers Hacking Meth... 00:06:45
-
Attackers Hacking Methodology 00:06:45
Mohamed Ibrahim
- 52 Courses
- 2416 Students
- 0 Reviews
DR.MOHAMED IBRAHIM, B.E, CCIE, VCIX, NSE3
He is having 20+ years of experience in IT with expertise in Networking, Security, Data Center, Virtualization, and HCI. He has handled major ICT projects across the Middle East region covering UAE, Qatar, and Kuwait and also trained hundreds of students around the globe in the Network Security domain from basic level to expert level.
Item Reviews - 0
Submit Reviews
This Course Include:
- 02:30 Hours On-Demand Videos
- 21 Lessons
- Lifetime Access
- Access on Mobile and TV