Continuous Monitoring and Security Operations
Course Code: IFIS/SCA/CS001
About this Course
This course will best position your organization to analyse threats and detect anomalies that could indicate cyber criminal behavior. The payoff for this new proactive approach would be early detection of an intrusion, or successfully thwarting the efforts of attackers altogether.
What You Will Learn?
- Analyze a security architecture for deficiencies
- Apply the principles learned in the course to design a defensible security architecture
- Understand the importance of a detection-dominant security architecture and Security Operations Centers (SOC)
- Identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM)
- Determine appropriate security monitoring needs for organizations of all sizes
- Implement robust Network Security
- Monitoring/Continuous Security Monitoring
- Determine requisite monitoring capabilities for a SOC environment
- Determine capabilities required to support continuous monitoring of key Critical Security Controls
Laptop Requirements
- CPU: 64-bit 2.0+ GHz processor or higher-based system is mandatory for this class (Important – Please Read: a 64-bit system processor is mandatory)
- BIOS/UEFI: VT-x, AMD-V, or the equivalent must be enabled in the BIOS/UEFI
- RAM: 8 GB (Gigabytes) of RAM or higher is mandatory for this class (Important – Please Read: 8 GB of RAM or higher is mandatory)
- Wired Ethernet port (or adapter)
- Wireless Ethernet 802.11 B/G/N/AC
- USB 3.0 Ports Highly Recommended
- Disk: 25 Gigabytes of free disk space
- VMware Workstation 11, Workstation Player 7, or Fusion 7 (or newer)
- A Linux and Windows 10 Virtual machine will be provided in class
Learning Outcomes
You will learn;
- Increase your understanding and enhance your skills in implementing Continuous Monitoring.
- Timely incident detection
- Combat cyber threats and prevent cyber attacks
Prerequisites
Prior condition for this course
- Basic understanding of network protocols and devices
- Experience with Linux and Windows from the command line
Course Outline
Target Audience
- Security Architects
- Senior Security Engineers
- Technical Security Managers
- SOC Analysts
- SOC Engineers
- SOC Managers
- CND Analysts
- Individuals working to implement Continuous Diagnostics and Mitigation (CDM), Continuous Security Monitoring (CSM), or Network Security Monitoring (NSM)
Duration and Fees
Duration: 5 days
Pricing: $500