Overview
This course aims to teach learners how to build a Cyber Security Operations Center (SOC) by covering topics such as challenges, objectives, recovery times, compliance framework, data aggregation, change management, incident response, and security maturity. The course provides insights into individual skills and tools related to processes, data recovery, infrastructure, asset repository, threat cases, and offensive naming conventions. The teaching method involves hands-on talks and presentations from experts in the INFOSEC field. The intended audience for this course includes decision-makers, security specialists, entrepreneurs, developers, and anyone interested in enhancing their knowledge of cybersecurity operations.
Syllabus
Introduction
Challenges
Objectives
Recovery Times
Compliance Framework
Data aggregation
Key success factors
Change management
Processes
Data Recovery
Infrastructure
Asset Repository
Threat Cases
Offensive Naming Convention
Sock
Incident Response
Security Maturity
Taught by
DefCamp