COURSE OUTLINE

Session 9

Network devices log analysis

Session 5

Setting up your monitoring and hunting infrastructure (based on ELK stack)

Session 6

Network and perimeter security

Session 1

Current state of cyber threats

Session 2

Operational security goals and approaches

Session 4

Cyber threat intelligence and hunting

Session 3

Security operations center architecture, processes and tools

Session 7

Common network attacks, attack tools and network monitoring

Session 8

Network traffic analysis

Session 10

Windows architecture and security

Session 11

Windows logs and monitoring

Session 12

Active Directory attacks and detection

Session 13

Windows attack techniques and their detection

Session 14

Linux architecture and security
Linux logs and monitoring
Linux logs analysis

Session 15

Other security operations tasks: security assessment, compliance,  change management and access control, etc Security assessment practice.