MODULE

1

Introduction to Networking

This module covers elementary networking concepts which enable Security Operations.

Networking Components

Network types & Topologies

Network protocols

OSI Model

image
MODULE

2

Cyber Security

This module covers basics of Cyber Security ecosystem which lays a strong foundation to perform Security Operations.

3 Pillars of Cybersecurity

Cybersecurity Principals

Fundamentals of Governance, Risk, and Compliance

Information Security Laws, Regulations & Guidelines

image
MODULE

3

Security Operations Centre (SOC)

This module covers setting up of a SOC for preventing, detecting, analysing, and responding to cybersecurity incidents.

Need of SOC

SOC Architecture

SOC Components

Operational Challenges in SOC

image
MODULE

4

Data Collection, Monitoring, and Analysis

This module covers various processes around collection of raw data & bringing meaningful results by analysis of such data.

The need for Cyber Security

Data collection & Monitoring process

Log Data Analysis and Management

Event Correlation and Techniques

Packet Analysis & Filtering Mechanism

image
MODULE

5

SOC Processes

This module covers various processes implemented for smooth & effected functioning of a SOC.

Ticket & Process Management

Incident Management

Change Management

Documentation and Reporting

image
MODULE

6

Threat Intelligence for SOC Operations

This module covers how threat intelligence can be built in SOC.

Threat Intelligence Lifecycle

Identifying Security Threats through Intelligence

Best Practices of Threat Intelligence

image
MODULE

7

Web Application Security Testing

This module covers the process of identifying vulnerabilities, exploiting known weaknesses in the application/technical infrastructure & documenting the results.

OWASP Top 10

Vulnerability Assessment

Penetration Testing

Security Testing reports

image
MODULE

8

SOC Tools and Technologies

This module covers essential security platforms for running successful Security Operation Centre.

Data-Collection Tools

Security Incident and Event Management

Data Loss Prevention

Intrusion Detection & Prevention System

Endpoint Protection

image

Start your career in Cyber Security today!

Take your dreams to reality