EC council Security Operations​ - CSA
Reference : ECC ECSS-003Educational objectives
At the end of this training, the participants will be able to:
- Gain knowledge of Security Operations Center (SOC) processes, procedures, technologies, and workflows.
- Develop a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, etc.
- Demonstrate the use of standard forensic tools necessary to successfully carry out a computer forensic investigation.
- Explain the methodological approach to computer forensics presented by CSA, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Demonstrate proficiency in handling and responding to various security incidents.
Course programme
This course covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the participants will learn to manage various SOC processes and collaborate with CSIRT at the time of need.
Who is this course for?
Public
This training is meant for information security professionals who want to develop the skills and knowledge necessary to conduct security assessments, identify vulnerabilities, and recommend remediation strategies.
Prerequisites
This program requires a candidate to have one year of work experience in the Network Admin/Security domain.