Skip to main content

Section outline

  • Security Operations Fundamentals & CIA Triad
    • Overview of Security Operations Centers (SOC)
    • SOC deployment models: Dedicated vs. Virtual
    • When to deploy a SOC & business protection strategies
    SOC Components - Tools & Technologies
    • Firewalls, IDS/IPS, and Web Application Firewalls (WAFs)
    • Endpoint Detection & Response (EDR/XDR) and Web Proxy Servers
    • SIEM & SOAR for automated security incident response
    • Threat intelligence, honeypots, and deception techniques
    • Cloud security & CASB (Cloud Access Security Brokers)
    SOC Components - People & Processes
    • SOC roles & responsibilities
    • Incident response policies, compliance, and best practices