5 out of 5
5
6 reviews

Information Security – SOC – L1

This SOC – L1 course is an introductory course designed to provide students with a foundational understanding of Information Security and the role of a Security Operations Center. The course covers a range of topics such as the basics of Information Security, Global Security, Hackers Inference, Compliance, Deception Techniques, SOC Core Principles & Guidelines, and State of the Art. Students will also gain hands-on experience with various tools such as SIEM and InfoSec tools to give them a practical understanding of the concepts learned. The course is suitable for individuals looking to pursue a career in Information Security or anyone interested in learning the fundamentals of Information Security.

35 students enrolled

This course offers a thorough introduction to information security’s fundamental concepts with a particular focus on the Security Operations Centre (SOC) Level 1. Information security basic principles, global security, hacker inference, compliance, deception techniques, SOC core principles & guidelines, and state of the art are just a few of the subjects covered in the course.

An introduction to information security and the function of a SOC in it comes first in the course. The significance of Corporeal Security Policies & Procedures, Statistics Protection Overview, GRID Layer Enrichment Understanding, and Transference Layer Security are afterwards covered. The themes of Resilience of Gathering of Attacks, How to Be Vigilant on Acquainting, Prosecution of Attackers, and International Frameworks are further explored in the course.

Additionally, students will learn about Anatomy of an Attack, C 10 Checklist, Security Incident Management, IRP, Security Operations, Military Triager, Fog and Edge Computing Security, Deception Techniques, Digital Forensics, Artificial Intelligence in Information Security, and How can you Detect? How Should You React?

Last but not least, the course discusses the newest information security topics, such as OT/IOT Security, Automotive Security, Artificial Intelligence, Metaverse Security, and Ransomware Attack Re-Treatments.

In order to provide students with a practical grasp of the ideas covered, the course also offers hands-on training with a variety of tools, including SIEM (Azure Sentinel, IBM-QRadar, Seceon, Wazuh, AlienVault, and Splunk) and InfoSec Tools (Nessus, QualysGuard, Retina Scan, NMAP, and MetaSploit).

Information Security Inception

1
INFO SEC - What World Wants Now
2
SOC - ACRONYM - All About SOC
3
FALL PREY - Anytime Were You?
4
SOC - ACRONYM - All About SOC

Are you a Warrior?

1
Compliance in SOC
2
Be a Military Triager or military triage expectant
3
What Security all Corporate has?
4
Fog and Edge Computing Security

RECONNAISSANCE of Global Security

1
Corporeal Security Policies & Procedures
2
Corporeal Security Policies & Procedures
3
Statistics Protection Overview
4
GRID Layer Enrichment Understanding
5
GRID Layer Enrichment Understanding
6
Transference Layer Security

SOC Core Principles & Guidelines

1
Anatomy of Attack
2
C 10 Checklist
3
Security Incident Management
4
IRP
5
Security Operations
6
How can you Detect?
7
What You Should Respond?

Hackers Inference

1
Resilience of Gathering of Attacks
2
Resilience of Gathering of Attacks
3
How to be Vigilant on Acquainting
4
Prosecution of Attackers
5
Prosecution of Attackers
6
International Frameworks

SIEM - Tools

1
Azure Sentinel
2
IBM – QRadar
3
Seceon
4
Wazuh
5
AlienVault
6
Splunk

Are you a Warrior?

1
Compliance in SOC
2
Be a Military Triager or military triage expectant
3
What Security all Corporate has?
4
Fog and Edge Computing Security

Deception Techniques

1
VGhpcyBpcyBIb3cgQXR0YWNrZXJzIENvbW11bmljYXRl - DECODE ME
2
VGhpcyBpcyBIb3cgQXR0YWNrZXJzIENvbW11bmljYXRl - DECODE ME
3
Worldwide Security Attacks
4
Worldwide Security Attacks
5
Digital Forensics and Investigation
6
Digital Forensics and Investigation
7
Artificial Intelligence in Information Security

SOC Core Principles & Guidelines

1
Anatomy of Attack
2
C 10 Checklist
3
Security Incident Management
4
IRP
5
Security Operations
6
How can you Detect?
7
What You Should Respond?

State of the Art

1
OT/ IOT Security
2
OT/ IOT Security
3
Automotive Security
4
Artificial Intelligence
5
Artificial Intelligence
6
Metaverse Security
7
Metaverse Security
8
Ransomware Attack Re-Treatments

SIEM - Tools

1
Azure Sentinel
2
IBM – QRadar
3
Seceon
4
Wazuh
5
AlienVault
6
Splunk

InfoSec Tools

1
Nessus
2
Kali Linux
3
QualysGuard
4
Wire Shark
5
Retina Scan
6
FTK Imager
7
NMAP
8
Maltego
9
MetaSploit
10
Defender
11
Kali Linux
12
Wire Shark
13
FTK Imager
14
Maltego
15
Defender
The course covers a range of subtopics related to information security, including corporeal security policies and procedures, statistics protection, GRID layer enrichment, and transference layer security.
The main features of the course include a comprehensive overview of global security, best practices for establishing effective security policies and procedures, techniques for securing statistical data, an understanding of the GRID layer of security and the technologies used to secure it, and techniques for protecting data as it is transmitted between systems.
The course is designed to be accessible to learners with a basic understanding of information technology and security. However, some prior knowledge or experience in these areas may be helpful.
By completing the "RECONNAISSANCE of Global Security" course, learners will gain a comprehensive understanding of global security and best practices for protecting sensitive information at different layers of security. This knowledge can be applied in a variety of professional settings and can help learners advance their careers in the field of information security.
The course is designed for a broad audience, including IT professionals, security professionals, managers, and business owners.

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


5
5 out of 5
6 Ratings

Detailed Rating

Stars 5
6
Stars 4
0
Stars 3
0
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
30-Day Money-Back Guarantee

Includes

9 hours
Full lifetime access
Access on mobile and TV
Information Security – SOC – L1
Price:
₹90,000 ₹75,000