Learn everything to get started in Forensics Investigations. Unlock Lifetime Access to Certification with Complimentary Training and free-of-cost Online Internship: pay only for certification and lab costs.
Course Objectives
- Monitor computer networks for security issues.
- Investigate security breaches and other cyber security incidents.
- Operate tools and software to protect systems and information infrastructure, including firewalls and data encryption programs.
- Document security breaches and assess the damage they cause.
- Work with security team to perform tests and uncover network vulnerabilities.
- Fix detected vulnerabilities to maintain a high-security standard.
- Stay current on IT security trends and news.
- Develop company-wide best practices for IT security.
- Perform penetration testing.
- Research security enhancements and make recommendations to management.
- Stay up-to-date on information technology trends and security standards.
Course Content
- Emerging attack trends
- Understanding Modern SOC Architecture
- Roles and responsibilities in SOC
- Risk of unmapped, unmonitored network
- Establishing baselines for normal activities
- Key principles of network defense architecture
- Collection of Data
- Generating statistical data from existing data
- Detection mechanism, Indicators of compromise & Signatures
- Strategy for implementing EDR
- Detecting Incidents in SOC
- Searching across endpoints for IOCs
- Hands-on EDR
- Various pillars of continuous monitoring
- Continuous integration
- Continuous monitoring
- Malware infection
- Detecting malware via event logs
- Analysis and Reporting
- Hands-on activity using virtual labs
- High volume alerts and prioritizing for security
- Triaging techniques
- Validating data and submitting analysis for investigation
- Pursuing abnormal activity on servers & end-points
- Hand-on activity of threat hunting
- Detecting unknown attacks – approaches
- Various components of modern SOC
- Understanding SOAR
- Uses of UEBA
- Effectively building and using Threat Intelligence
- Various bottlenecks in SOC Operations
- People & process issues
- Technology and implementation challenges
- Daily SOC Operations – best practices
- Common mistakes to avoid
- Real world case studies
Who Should Attend
- Security Researchers
- Students and Professionals keen in Forensics Investigations
- Security Teams
- Law Enforcement Agencies
- Military and police personnel
What you Get
Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you.
Cyberange Virtual Labs comprises:
- Exclusive labs
- Real-world scenarios for practice
- Cloud-based labs with new challenges added every month
Get access to course video on the e-learning portal, Updated regularly.
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.
Get listed in the National Security Database program at the Falcon level by completing the program.
Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center
Delivery Format
85 hours Instructor-led Program.g
Weekly assignments and research.
How do I Access The Programme
- Buy the course online
- Save your payment transaction receipt for any future reference
- Our team will share the credentials to enable you access your course online within 2 business days of payment transfer and completion of the verification process.
Bulk Orders
Incase you are looking for bulk user licenses, or a combination of multiple courses reach out to us with your detailed requirements.
Reviews
There are no reviews yet.