Weekly study3 hours
Discover the techniques used by businesses to protect their cyber security
How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course.
You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.
- The role of the security operations centre (SOC)
- SOC processes
- SOC staff
- The SOC interface with the business
- SOC, governance and IT service management
- Security traps and the dark net
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Explore the role of the SOC and its members
- Demonstrate how a SOC could be integrated into existing business processes
- Evaluate sources of threat intelligence and their usefulness to the business
Who is the course for?
This course is for anyone looking to learn more about cyber security incidents and how they’re addressed by modern organisations.
Please note that the staff described in the ‘Who will you learn with?’ section below may be subject to change.
What software or tools do you need?
In order to complete the practical laboratory exercises that take place in this course and across the rest of the program, you’ll need to download and configure the Virtual Machines (VMs) from our repository. In order to complete the virtual labs you will need a PC capable of running Virtual Machines (VMs).
We recommend at least a dual-core CPU with Intel’s vt-x or AMD-V enabled (sometimes these features require a BIOS setting to activate in same laptops). You will also need a minimum of 8GB of memory and about 60GB of free hard disk space to store the VMs.
Learner reviews cannot be loaded due to your cookie settings. Please and refresh the page to view this content.