Skip main navigation

Setting up a virtual lab

In order to complete the practical lab that takes place later this week, you’ll need to download and configure the virtual machines (VMs) from our repository. This step contains instructions …

Why is IT Governance Important?

IT governance can be thought of as the level above IT management. Governance is concerned with providing control and oversight to IT systems, which involves aligning IT management and operations …

The roles in our organisation

In this step we would like you to take all the information you now have and evaluate Ethos. Your task Produce a short report on what SOC roles our organisation …

Installing your own honeypot

We will look at more detail in honeypots later, when we look at the information gathering aspect of honeypots. However, so you can see how a honeypot might be useful, …

Honeypots

The information on what attackers are likely to do (also called intelligence) can be very useful in helping the SOC defend against attacks. Some of this we will get from …

Security incident response processes

The main processes of the SOC will centre on its key responsibility of security incident response. The processes involved with monitoring and Security Information and Event Management (SIEM) also link …

Review of the week

We hope you have enjoyed this look at Security Operations Centre (SOC). This week we have examined: The role of the SOC SOC processes SOC staff Next week, we’ll move …

The Security Operations Centre (SOC)

In a physical security setting, we might have a control room with lots of CCTV monitors, security personnel who will go around checking everything, locks, occupation and motion sensors and …

Getting the most out of your learning

As this might be your first time studying with Coventry University, we’ve put together a few tips to help you get the most out of the experience. Comments FutureLearn is …