TCM Security - SOC 101

TCM Security - SOC 101

The Cyber Mentor via YouTube Direct link

00:00 - Introduction

1 of 59

1 of 59

00:00 - Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

TCM Security - SOC 101

Automatically move to the next video in the Classroom when playback concludes

  1. 1 00:00 - Introduction
  2. 2 00:01:47- Flare Intro ad
  3. 3 07:00 - Course Objectives
  4. 4 10:23 - Prerequisites and Course Resources
  5. 5 16:05 - Installing Oracle VM VirtualBox
  6. 6 20:57 - Installing Windows
  7. 7 33:06 - Configuring Windows
  8. 8 43:22 - Installing Ubuntu
  9. 9 55:58 - Configuring Ubuntu
  10. 10 1:01:44 - Configuring the Lab Network
  11. 11 1:07:06 - The SOC and Its Role
  12. 12 1:25:46 - Information Security Refresher
  13. 13 1:48:40 - SOC Models, Roles, and Organizational Structures
  14. 14 2:00:09 - Incident and Event Management
  15. 15 2:07:35 - SOC Metrics
  16. 16 2:13:34 - SOC Tools
  17. 17 2:29:48 - Common Threats and Attacks
  18. 18 2:46:47 - Introduction to Phishing
  19. 19 3:00:51 - Email Fundamentals
  20. 20 3:13:25 - Phishing Analysis Configuration
  21. 21 3:19:30 - Phishing Attack Types
  22. 22 3:35:47 - Phishing Attack Techniques
  23. 23 3:50:47 - Email Analysis Methodology
  24. 24 3:56:27 - Email Header and Sender Analysis
  25. 25 4:17:51 - Email Authentication Methods
  26. 26 4:35:18 - Email Content Analysis
  27. 27 4:48:07 - The Anatomy of a URL
  28. 28 4:57:36 - Email URL Analysis
  29. 29 5:18:27 - Email Attachment Analysis
  30. 30 5:33:06 - Dynamic Attachment Analysis and Sandboxing
  31. 31 5:54:25 - Flare Middle ad
  32. 32 5:56:06 - Static MalDoc Analysis
  33. 33 6:03:00 - Static PDF Analysis
  34. 34 6:13:47 - Automated Email Analysis with PhishTool
  35. 35 6:19:58 - Reactive Phishing Defense
  36. 36 6:47:24 - Proactive Phishing Defense
  37. 37 7:00:43 - Documentation and Reporting
  38. 38 7:12:35 - Additional Phishing Practice
  39. 39 7:16:29 - Introduction to Network Security
  40. 40 7:22:07 - Network Security Theory
  41. 41 7:52:04 - Packet Capture and Flow Analysis
  42. 42 8:03:54 - Introduction to tcpdump
  43. 43 8:19:28 - tcpdump: Capturing Network Traffic
  44. 44 8:33:44 - tcpdump: Analyzing Network Traffic
  45. 45 8:47:32 - tcpdump: Analyzing Network Traffic Sample 2
  46. 46 9:02:17 - Introduction to Wireshark
  47. 47 9:18:09 - Wireshark: Capture and Display Filters
  48. 48 9:30:08 - Wireshark: Statistics
  49. 49 9:42:05 - Wireshark: Analyzing Network Traffic
  50. 50 10:01:34 - Intrusion Detection and Prevention Systems
  51. 51 10:09:15 - Introduction to Snort
  52. 52 10:26:52 - Snort: Reading and Writing Rules
  53. 53 10:51:36 - Snort: Intrusion Detection and Prevention
  54. 54 11:12:30 - Additional Network Traffic Analysis Practice
  55. 55 11:15:43 - Introduction to Endpoint Security
  56. 56 11:20:25 - Endpoint Security Controls
  57. 57 11:33:40 - Creating Our Malware
  58. 58 11:47:27 - Flare Outro Ad
  59. 59 11:49:04

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.