Become your organization's shield. Master Security Operations Center operations and learn to detect, respond to and proactively hunt threats.
Interested in training your team with this program?
Request a Quote Buy Individual Access — $29.90Intensive training designed to develop cyber defenders capable of operating in high-demand SOC environments.
Security Operations Center structure: L1/L2/L3 tiers, playbooks, incident escalation and SLA metrics.
Log collection, normalization and correlation. Detection rules, operational dashboards and alert tuning.
Windows Event Logs, Syslog, firewall and proxy logs. Identifying attack patterns in real data.
Indicators of Compromise (IoC), intelligence feeds, MITRE ATT&CK and adversary TTP mapping.
Full cycle: preparation, identification, containment, eradication, recovery and lessons learned (NIST SP 800-61).
Proactive detection: hunting hypotheses, behavioral analysis, normality baseline and Advanced Persistent Threat (APT) hunting.