Completed
00:00 - Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
TCM Security - SOC 101
Automatically move to the next video in the Classroom when playback concludes
- 1 00:00 - Introduction
- 2 00:01:47- Flare Intro ad
- 3 07:00 - Course Objectives
- 4 10:23 - Prerequisites and Course Resources
- 5 16:05 - Installing Oracle VM VirtualBox
- 6 20:57 - Installing Windows
- 7 33:06 - Configuring Windows
- 8 43:22 - Installing Ubuntu
- 9 55:58 - Configuring Ubuntu
- 10 1:01:44 - Configuring the Lab Network
- 11 1:07:06 - The SOC and Its Role
- 12 1:25:46 - Information Security Refresher
- 13 1:48:40 - SOC Models, Roles, and Organizational Structures
- 14 2:00:09 - Incident and Event Management
- 15 2:07:35 - SOC Metrics
- 16 2:13:34 - SOC Tools
- 17 2:29:48 - Common Threats and Attacks
- 18 2:46:47 - Introduction to Phishing
- 19 3:00:51 - Email Fundamentals
- 20 3:13:25 - Phishing Analysis Configuration
- 21 3:19:30 - Phishing Attack Types
- 22 3:35:47 - Phishing Attack Techniques
- 23 3:50:47 - Email Analysis Methodology
- 24 3:56:27 - Email Header and Sender Analysis
- 25 4:17:51 - Email Authentication Methods
- 26 4:35:18 - Email Content Analysis
- 27 4:48:07 - The Anatomy of a URL
- 28 4:57:36 - Email URL Analysis
- 29 5:18:27 - Email Attachment Analysis
- 30 5:33:06 - Dynamic Attachment Analysis and Sandboxing
- 31 5:54:25 - Flare Middle ad
- 32 5:56:06 - Static MalDoc Analysis
- 33 6:03:00 - Static PDF Analysis
- 34 6:13:47 - Automated Email Analysis with PhishTool
- 35 6:19:58 - Reactive Phishing Defense
- 36 6:47:24 - Proactive Phishing Defense
- 37 7:00:43 - Documentation and Reporting
- 38 7:12:35 - Additional Phishing Practice
- 39 7:16:29 - Introduction to Network Security
- 40 7:22:07 - Network Security Theory
- 41 7:52:04 - Packet Capture and Flow Analysis
- 42 8:03:54 - Introduction to tcpdump
- 43 8:19:28 - tcpdump: Capturing Network Traffic
- 44 8:33:44 - tcpdump: Analyzing Network Traffic
- 45 8:47:32 - tcpdump: Analyzing Network Traffic Sample 2
- 46 9:02:17 - Introduction to Wireshark
- 47 9:18:09 - Wireshark: Capture and Display Filters
- 48 9:30:08 - Wireshark: Statistics
- 49 9:42:05 - Wireshark: Analyzing Network Traffic
- 50 10:01:34 - Intrusion Detection and Prevention Systems
- 51 10:09:15 - Introduction to Snort
- 52 10:26:52 - Snort: Reading and Writing Rules
- 53 10:51:36 - Snort: Intrusion Detection and Prevention
- 54 11:12:30 - Additional Network Traffic Analysis Practice
- 55 11:15:43 - Introduction to Endpoint Security
- 56 11:20:25 - Endpoint Security Controls
- 57 11:33:40 - Creating Our Malware
- 58 11:47:27 - Flare Outro Ad
- 59 11:49:04