Examine the role and composition of a security operations centre (SOC) and how it works within an organisation.

1,983 enrolled on this course

  • Duration

    2 weeks
  • Weekly study

    3 hours
This course is part of the program Intrusion Detection and Response, which is one of the building blocks that leads to a degree in MSc Cyber Security. Find out more.

Discover the techniques used by businesses to protect their cyber security

How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course.

You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.

What topics will you cover?

  • The role of the security operations centre (SOC)
  • SOC processes
  • SOC staff
  • The SOC interface with the business
  • SOC, governance and IT service management
  • Security traps and the dark net

Learning on this course

On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.

What will you achieve?

By the end of the course, you‘ll be able to...

  • Explore the role of the SOC and its members
  • Demonstrate how a SOC could be integrated into existing business processes
  • Evaluate sources of threat intelligence and their usefulness to the business

Who is the course for?

This course is for anyone looking to learn more about cyber security incidents and how they’re addressed by modern organisations.

Please note that the staff described in the ‘Who will you learn with?’ section below may be subject to change.

What software or tools do you need?

In order to complete the practical laboratory exercises that take place in this course and across the rest of the program, you’ll need to download and configure the Virtual Machines (VMs) from our repository. In order to complete the virtual labs you will need a PC capable of running Virtual Machines (VMs).

We recommend at least a dual-core CPU with Intel’s vt-x or AMD-V enabled (sometimes these features require a BIOS setting to activate in same laptops). You will also need a minimum of 8GB of memory and about 60GB of free hard disk space to store the VMs.

Who will you learn with?

Faye is Acting Head of School of Computing, Electronics and Mathematics at Coventry. She has over 20 years experience as an academic, especially in the areas of AI, ML, ITSM, OSes, and cyber security

Dr. Sandy Taramonli is a Senior Lecturer at Coventry University and Course Director for Ethical Hacking and Cyber Security. Her interests include Cyber Security, Cryptography and Forensics.

Dr. Christo Panchev is a Senior Lecturer in Cyber Security at Coventry University with more than 20 years experience in industry and higher education, research and teaching in A.I. and Cyber Security.

Who developed the course?

Coventry University

Coventry secured 5 QS Stars for Teaching and Online Learning in the QS World University Ranking 2020 and has received No. 1 in the world for Massive Open Online Courses in MoocLab’s World University Ranking 2021.

  • Established

    1992
  • Location

    Coventry

Institute of Coding

The Institute of Coding is a family of learners, businesses and educators creating a new way to develop the digital skills needed at work and beyond.

Learning on FutureLearn

Your learning, your rules

  • Courses are split into weeks, activities, and steps to help you keep track of your learning
  • Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
  • Stay motivated by using the Progress page to keep track of your step completion and assessment scores

Join a global classroom

  • Experience the power of social learning, and get inspired by an international network of learners
  • Share ideas with your peers and course educators on every step of the course
  • Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others

Map your progress

  • As you work through the course, use notifications and the Progress page to guide your learning
  • Whenever you’re ready, mark each step as complete, you’re in control
  • Complete 90% of course steps and all of the assessments to earn your certificate

Want to know more about learning on FutureLearn? Using FutureLearn

Learner reviews

Learner reviews cannot be loaded due to your cookie settings. Please and refresh the page to view this content.

Advance your career with a degree

Since 2017 you have been able to take a degree on FutureLearn. This free course is a bit like a starter course for a degree — it should give you a flavour of the degree subject but can also be your first step towards a degree qualification.

If you enjoy this course you can apply to join the program it’s part of to start working towards a degree on FutureLearn.

Don’t worry, you can still take the course without doing a full degree!

Do the free course
Join and complete the program
Get academic credit for an online degree from Coventry University
This course is part of the program Intrusion Detection and Response, which is one of the building blocks that leads to a degree in MSc Cyber Security.

Do you know someone who'd love this course? Tell them about it...

You can use the hashtag #FLsecurityoperations to talk about this course on social media.