Those responsible for the initial triage of an incident are the SOC analysts and incident responders; This course covers the necessary skills and practices to train such SOC personnel and successfully operate a modern-day SOC. The training starts from a broad understanding of the various functions in a SOC and a thorough workout on its technologies, up to a real-time hands-on practice in a virtual simulation environment.
NS107 Final Project: create a code that will be used for IR teams to analyze memory files.
FIVE | ELEVEN | 85% | 40
SCENARIOS LABS HANDS-ON DURATION
Basic Log Filtering
Advanced Log Filtering
Snort and Snort Alerts
During the coronavirus, medical research university suffered a data breach. Criminal groups seek to exploit the crisis for financial gain. We need to track down their actions to understand what was stolen. Our tech engineer captured the network traffic during the attack; you have the task to solve the incident.
Recently a large insurance company called VitaLife has suffered a severe breach. The SOC team who worked on that breach that day are still investigating the scene. You have been asked to filter through those logs to find the possible cause of the attack.
Information about 60% of the US population was exposed to what is believed to be the largest ever known exposure. The IT department found an unsecured server, which is now under in-depth investigation by your team. The company using your services to investigate the server that held a large amount of that data to mitigate this issue.
Financial company in Asia suffered from a Ransomware attack, which made them pay $1 million in bitcoin, to restore encrypted files. They hired you as a specialist to help them find any tracks. The SOC team was able to monitor some of that traffic that might contain valuable information related to the attack.
A company suspects it has been attacked and needs your help in finding network traces done by a group of hackers that are targeting several businesses and organizations in Germany.
To be eligible for the certificate, the student must complete four scenarios (out of five) and submit the project associated with the course.
Score distribution: 60% scenarios + 40% project.
SIEM/SOC Intermediate Certification
What our students say
"This course showed me how to really look at cyber threats."
"Using the simulator made it that now I know how to function in real situations"