- SOC Part 1
Beginner
Online
₹ 1,299
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
Security Operations Center - SOC with Splunk and FortiSIEM Course will enable the students to have a deep understanding of Security Operations Center ( SOC) and help them to build the skills and knowledge needed to become an Analyst in a SOC Team. The curriculum of the Security Operations Center - SOC with Splunk and FortiSIEM Online Course created by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! will provide the learners with an overview of Computer Network, Topologies, Network Footprinting, OSI, TCP IP Protocol Suite and many more.
Security Operations Center - SOC with Splunk and FortiSIEM Certification, provided by Udemy, is open for all the learners who are keen to join the security operations centre and does not have specific prerequisites. The candidates who are looking forward to joining the course will have to pay the fee.
The highlights
- Online course
- Downloadable resources
- Full lifetime access
- Access on mobile and TV
- Certificate of completion
- English videos
- 30-Day Money-Back Guarantee
Program offerings
- 34.5 hours on-demand video
- 3 downloadable resources
- Full lifetime access
- Access on mobile and tv
- Certificate of completion
- English videos
Course and certificate fees
Fees information
certificate availability
certificate providing authority
What you will learn
Through Security Operations Center - SOC with Splunk and FortiSIEM Online Certification, the learners will have the opportunity to study cyber security, Security Operations Center, SOC with Splunk and FortiSIEM, firewalls, intrusion detection, prevention systems, OSI Model, various mnemonics, protocol data units and a lot more.
The syllabus
Introduction: Part 1 Introduction
SOC Part 2: Importance of learning SOC
- SOC Part 2
SOC Part 3: What curriculum is covered?
- SOC Part 3
SOC Part 4: Security Triad: Confidentiality, Integrity & Availability
- SOC Part 4
SOC Part 5: Computer Network, Topologies
- SOC Part 5
- Information Security Quiz
SOC Part 6: Day 4: Network Footprinting
- SOC Part 6: Day 4
SOC Part 7: Day 6
- Day 6
Network Concepts Refresher, OSI , TCPIP Protocol Suite
- Network Concepts
- OSI Continued
- OSI Last Part
- TCP/IP Protocol Suite
- Network Concepts, OSI & TCP/IP Quiz
Cybersecurity Attacks, Ethical Hacking , DoS, DSoS. SYN Flooding, Metaploit
- Cybersecurity Attacks
- Ethical Hacking
- DoS DDoS
- SYN Flooding using Hping3
- Counter Measures
- Metasploit Test
- Test Yourself
Maltego, Cyber Killchain methodology, Information security vectors, Ransomware
- Maltego
- Cyber kill chain methodology
- Information security vectors
- Ransomware
- Web Application Security
- Test Your Knowledge
SIEM : Security Information and Event Management
- SIEM
- Key Objectives
- Defence in Depth
- Corporate Environment
- Log Management
- Why is SIEM necessary?
- Use Cases
- Elements of SIEM
- SIEM Deployment Options
- Splunk Introduction
- Splunk UI Introduction
- Basic Transformation Commands
- Creating Reports and Dashboards
- Saving and Sharing Reports
- Dashboards
- Creating Alerts
- Test Yourself!
Enterprise Splunk
- Splunk Part1
- Splunk Part2
- Splunk Part3
- Splunk Part4
- Test Yourself!
FortiSIEM: A Case Study on a powerful SIEM
- FortiSIEM Foundation
- FortiSIEM Part2
- FortiSIEM Part3
- FortiSIEM Conclusion
Incidence Response, Email system, Virus, Vulnerability Management and Conclusion
- Cyber security incidence response
- Email SMTP, Email system, Webmail architecture
- Virus, other types and Anti-Virus
- Vulnerability Management
- Test Yourself!
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Cyber Security Certification
Board Infinity
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Introduction to Cybersecurity for Business
CU Boulder via Coursera
Courses of your interest
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning