COURSE OUTLINE
Session 9
Network devices log analysis
Session 5
Setting up your monitoring and hunting infrastructure (based on ELK stack)
Session 6
Network and perimeter security
Session 1
Current state of cyber threats
Session 2
Operational security goals and approaches
Session 4
Cyber threat intelligence and hunting
Session 3
Security operations center architecture, processes and tools
Session 7
Common network attacks, attack tools and network monitoring
Session 8
Network traffic analysis
Session 10
Windows architecture and security
Session 11
Windows logs and monitoring
Session 12
Active Directory attacks and detection
Session 13
Windows attack techniques and their detection
Session 14
Linux architecture and security
Linux logs and monitoring
Linux logs analysis
Session 15
Other security operations tasks: security assessment, compliance, change management and access control, etc Security assessment practice.