SECURITY OPERATIONS CENTER ANALYST

Microsoft Security Operations Analyst

This 4-day course guides individuals on ways to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. You will also be taught mitigation methods during cyberthreats using these technologies.  

By the end of this course, you’ll gain skills in: 

  • Explaining how Microsoft Defender for Endpoint can remediate risks in your environment 
  • Creating a Microsoft Defender for Endpoint environment 
  • Performing actions on a device using Microsoft Defender for Endpoint 
  • Investigating domains and IP addresses in Microsoft Defender for Endpoint 
  • Explaining how the threat landscape is evolving 
  • and much more  
Learn More

 

Understanding Cisco Cybersecurity Operations Fundamentals v1.0 

A comprehensive 5-day course aimed at teaching you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. You will also learn how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents amongst other things. 

By the end of this course, you’ll gain skills in: 

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective. 
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. 
  • Explain the data that is available to the network security analyst. 
  • Describe the basic concepts and uses of cryptography. 
  • And much more. 
Learn More

 

CSOCA: Certified Security Operation Center (SOC) Analyst

A security operations centre (SOC) is a facility operating 24 x 7 x 365, where enterprise information systems (data centres, servers, networks, desktops and other endpoints) are monitored, assessed, and defended around the clock. SOC Analysts are the backbone for the operations of a SOC. This course prepares you to be ready for the real-world challenges of a SOC Analyst.

By the end of this course, you’ll gain skills in: 

  • Gain in-depth knowledge of security threats, attacks, vulnerabilities, attackers’ behavior, cyber kill chain, SOC processes, procedures, technologies, and automation workflows
  • Understand the MITRE ATT&CK Framework and able to identify attacker techniques, tactics, and procedures (TTP) to investigate indicators of  compromise (IOCs) and provide automated / manual responses to eliminate the attack/incident
  • Understand SOC and its processes, roles, responsibilities and implementation models
  • Able to monitor and work on alerts generated based on various log sources Ex: IDS/IPS, AV, EDR, Firewall, Network Monitoring applications, etc.
  • Gain in-depth knowledge on all the latest defense technologies that are used in next generation SOC deployments. Ex: NGAV, SIEM, EDR, XDR, SOAR, TI, UEBA, IAM/PAM, etc.
Learn More

© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED

CONNECT WITH US