Course Outline

  • Defining the Security Operations Center for Government
  • Understanding Network Infrastructure and Network Security Monitoring Tools for Government
  • Exploring Data Type Categories in a Government Context
  • Understanding Basic Cryptography Concepts for Government Applications
  • Understanding Common TCP/IP Attacks and Their Relevance to Government Networks
  • Understanding Endpoint Security Technologies for Government Systems
  • Understanding Incident Analysis in a Threat-Centric SOC for Government Operations
  • Identifying Resources for Hunting Cyber Threats in the Government Sector
  • Understanding Event Correlation and Normalization for Government Networks
  • Identifying Common Attack Vectors Targeting Government Systems
  • Identifying Malicious Activity within Government Networks
  • Identifying Patterns of Suspicious Behavior in Government IT Environments
  • Conducting Security Incident Investigations for Government Agencies
  • Using a Playbook Model to Organize Security Monitoring for Government Operations
  • Understanding SOC Metrics for Effective Government Oversight
  • Understanding SOC Workflow and Automation for Enhanced Government Efficiency
  • Describing Incident Response in the Context of Government Operations
  • Understanding the Use of VERIS for Government Cybersecurity Reporting
  • Understanding Windows Operating System Basics for Government IT Staff
  • Understanding Linux Operating System Basics for Government IT Staff

Requirements

  • Demonstrated understanding of Ethernet and TCP/IP networking for government applications
  • Practical experience with both Windows and Linux operating systems in a professional setting
  • Basic knowledge of network security principles to ensure robust and secure communications for government use
 35 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories