Course Outline

  • Defining the Security Operations Center for Government
  • Understanding Network Infrastructure and Network Security Monitoring Tools for Government
  • Exploring Data Type Categories for Government
  • Understanding Basic Cryptography Concepts for Government
  • Understanding Common TCP/IP Attacks for Government
  • Understanding Endpoint Security Technologies for Government
  • Understanding Incident Analysis in a Threat-Centric SOC for Government
  • Identifying Resources for Hunting Cyber Threats for Government
  • Understanding Event Correlation and Normalization for Government
  • Identifying Common Attack Vectors for Government
  • Identifying Malicious Activity for Government
  • Identifying Patterns of Suspicious Behavior for Government
  • Conducting Security Incident Investigations for Government
  • Using a Playbook Model to Organize Security Monitoring for Government
  • Understanding SOC Metrics for Government
  • Understanding SOC Workflow and Automation for Government
  • Describing Incident Response for Government
  • Understanding the Use of VERIS for Government
  • Understanding Windows Operating System Basics for Government
  • Understanding Linux Operating System Basics for Government

Requirements

  • Proficiency in Ethernet and TCP/IP networking for government applications
  • Practical experience with Windows and Linux operating systems for government environments
  • Understanding of fundamental networking security principles for government use
 35 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories