Skip to main content

Section outline

  • Security Operations Fundamentals & CIA Triad
    • Overview of Security Operations Centers (SOC)
    • SOC deployment models: Dedicated vs. Virtual
    • When to deploy a SOC & business protection strategies
    SOC Components - Tools & Technologies
    • Firewalls, IDS/IPS, and Web Application Firewalls (WAFs)
    • Endpoint Detection & Response (EDR/XDR) and Web Proxy Servers
    • SIEM & SOAR for automated security incident response
    • Threat intelligence, honeypots, and deception techniques
    • Cloud security & CASB (Cloud Access Security Brokers)
    SOC Components - People & Processes
    • SOC roles & responsibilities
    • Incident response policies, compliance, and best practices
  • Incident Response (IR) Overview
    • Key concepts & phases of IR
    • Remote vs. on-premise IR strategies
    Preparation & Detection
    • Incident prevention strategies & communication planning
    • Network perimeter & endpoint detection techniques
    • Application-layer monitoring & log analysis
    Containment, Eradication & Recovery
    • Attack remediation & vulnerability management
    • System restoration & post-incident validation
    Post-Incident Activity
    • Lessons learned & incident reporting
  • Email Spoofing & Authentication
    • SPF, DKIM, and DMARC
    • Defending against phishing & impersonation attacks
    Malicious Attachments & URLs
    • Email threat analysis & detection techniques
    • Identifying and mitigating malicious URLs
    Advanced Email Security Controls
    • User awareness training with phishing simulators
    • Multi-Factor Authentication (MFA) & Conditional Access policies
    Responding to Email Attacks
    • Incident response for email-based threats