Security operations Course

2 hours, 10 minutes

Syllabus

Logging

Video - 00:14:00

Khet will discuss logging and how this applies to system and network architecture.
Operating system concepts

Video - 00:20:00

As an analyst, you will be required to understand basic operating functions along with how they interact with different security systems in your network. Understanding the characteristics of these operating system concepts will help you further your CySA knowledge.
Infrastructure concepts

Video - 00:11:00

In this episode, we will learn all about infrafrsucture concepts and discuss how they impact your environment.
Network architecture, part 1

Video - 00:12:00

Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Network architecture, part 2

Video - 00:08:00

Network components can be all over the place, both physically and logically. You have to understand how your network nodes are physically connected and logically organized to secure them from attack.
Identity and access management (IAM)

Video - 00:13:00

You can’t restrict resource access to authorized users unless you can identify valid users. Identity management lets you know who is valid and who is not.
Encryption

Video - 00:08:00

Defensive security isn’t enough to stay safe. You must actively protect sensitive data from attacks instead of just reacting to attacks.
Standardized processes

Video - 00:14:00

With all of the rapidly changing security data available, the task of making sense of it becomes more and more difficult. Standards and protocols help to build automation tools to carry out many of the repetitive tasks efficiently.
Streamlined operations

Video - 00:10:00

In this episode, you will learn how to streamline operations with SOAR as well as other processes and tasks involving the human element.
Technology and tool integration

Video - 00:11:00

Technology and tools are constantly evolving in the realm of cyber security. This episode will give a high level overview of scripting, API's, webhooks, and plugins related to technology and tool integrations.
Threat actors

Video - 00:09:00

No human can manually monitor multiple systems and devices 24/7 to catch attacks from random sources. Automated monitors help to identify threat actors and Indicators of Compromise (IoC). These automated monitors not only make security easier, they also make it possible.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust