Cybersecurity Operations Fundamentals Specialization

By theetay.com Categories: Coursera
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Cybersecurity Operations Fundamentals Specialization, Launch Your Career in Cybersecurity Operations. Learn the basic skills required to become an entry-level cybersecurity operations analyst in a Security Operations Center (SOC). The Cybersecurity Operations Fundamentals Specialization gives you the basic skills you need to begin a career as an entry-level cybersecurity analyst. As you progress through this Specialization, you’ll gain the foundational knowledge that organizations require to protect their network. Completing this Specialization will prepare you to start your career as a Security Operations Center Analyst.

What Will You Learn?

  • The concepts behind TCP/IP networking communication
  • The basics of networking communication, common attack vectors, and malicious activities
  • The patterns of suspicious behaviors typically encountered when working in a Security Operations Center (SOC)

Course Content

01. Security Operations Center (SOC)

  • 001 01_introduction-to-security-operations-center_instructions.html
    00:00
  • 004 02_introduction-to-security-operations-center.mp4
    00:00
  • 007 01_soc-defined.mp4
    00:00
  • 008 02_soc-defined_instructions.html
    00:00
  • 011 01_soc-environment-today.mp4
    00:00
  • 012 02_soc-environment-today_instructions.html
    00:00
  • 013 03_soc-environment-today_quiz.html
    00:00
  • 016 01_goal-of-a-soc.mp4
    00:00
  • 017 02_goal-of-a-soc_instructions.html
    00:00
  • 018 03_goal-of-a-soc_quiz.html
    00:00
  • 021 01_challenges-of-a-soc.mp4
    00:00
  • 022 02_challenges-of-a-soc_instructions.html
    00:00
  • 023 03_challenges-of-a-soc-practice-quiz_quiz.html
    00:00
  • 026 01_wrap-up.mp4
    00:00
  • 027 02_wrap-up_instructions.html
    00:00
  • 031 01_introduction-to-security-operations-center-processes-and-services.mp4
    00:00
  • 032 02_introduction-to-security-operations-center-processes-and-services_instructions.html
    00:00
  • 035 01_soc-interaction-with-other-departments.mp4
    00:00
  • 036 02_soc-interaction-with-other-departments_instructions.html
    00:00
  • 037 03_soc-interaction-with-other-departments-practice-quiz_quiz.html
    00:00
  • 040 01_common-soc-services.mp4
    00:00
  • 041 02_common-soc-services_instructions.html
    00:00
  • 042 03_common-soc-services-practice-quiz_quiz.html
    00:00
  • 043 01_wrap-up_instructions.html
    00:00
  • 046 02_wrap-up.mp4
    00:00
  • 047 01_security-operations-center-processes-and-services-course-exam_exam.html
    00:00
  • 051 02_introduction-to-soc-deployment-models-and-types.mp4
    00:00
  • 052 01_introduction-to-soc-types-and-staffing-considerations_instructions.html
    00:00
  • 055 02_soc-types-and-staffing-considerations.mp4
    00:00
  • 056 03_soc-types-and-staffing-considerations_instructions.html
    00:00
  • 057 04_compliance-based-soc_instructions.html
    00:00
  • 058 05_operational-based-soc_instructions.html
    00:00
  • 059 06_soc-types-and-staffing-considerations-practice-quiz_quiz.html
    00:00
  • 060 01_introduction-to-soc-models-and-their-consumers_instructions.html
    00:00
  • 063 02_soc-models-and-their-consumers.mp4
    00:00
  • 064 03_soc-models-and-their-consumers_instructions.html
    00:00
  • 065 04_soc-models-and-their-consumers-practice-quiz_quiz.html
    00:00
  • 066 01_wrap-up_instructions.html
    00:00
  • 069 02_wrap-up.mp4
    00:00
  • 070 01_soc-deployment-models-and-types-course-exam_exam.html
    00:00
  • 074 02_introduction-to-staffing-an-effective-soc-team.mp4
    00:00
  • 075 01_topic-introduction-to-soc-roles_instructions.html
    00:00
  • 078 02_soc-roles.mp4
    00:00
  • 079 03_soc-roles_instructions.html
    00:00
  • 080 04_soc-tasks-and-responsibilities-overview_instructions.html
    00:00
  • 081 05_soc-roles-practice-quiz_quiz.html
    00:00
  • 082 01_introduction-to-interaction-of-different-roles-within-the-soc_instructions.html
    00:00
  • 085 02_interaction-of-various-roles-within-the-soc.mp4
    00:00
  • 086 03_interaction-of-various-roles-within-the-soc_instructions.html
    00:00
  • 087 04_interaction-of-different-roles-within-the-soc-practice-quiz_quiz.html
    00:00
  • 088 01_wrap-up_instructions.html
    00:00
  • 091 02_wrap-up.mp4
    00:00
  • 092 01_staffing-an-effective-soc-team-course-exam_exam.html
    00:00
  • 096 02_introduction-to-security-events-data-and-soc-analyst-tools.mp4
    00:00
  • 099 01_soc-relevant-data-and-security-event-data-introduction.mp4
    00:00
  • 100 02_soc-relevant-data-and-security-event-data-introduction_instructions.html
    00:00
  • 101 03_session-data_instructions.html
    00:00
  • 102 04_full-packet-capture_instructions.html
    00:00
  • 103 05_transaction-data_instructions.html
    00:00
  • 104 06_extracted-content_instructions.html
    00:00
  • 105 07_statistical-data_instructions.html
    00:00
  • 106 08_alert-data_instructions.html
    00:00
  • 107 09_external-data_instructions.html
    00:00
  • 108 10_soc-relevant-data-and-security-event-data-practice-quiz_quiz.html
    00:00
  • 109 01_introduction-to-soc-tools-and-their-features_instructions.html
    00:00
  • 112 02_soc-tools-and-their-features.mp4
    00:00
  • 113 03_soc-tools-and-their-features_instructions.html
    00:00
  • 116 04_soc-tools-and-their-features-cont.mp4
    00:00
  • 117 05_soc-tools-and-their-features-cont_instructions.html
    00:00
  • 118 06_security-information-and-event-management_instructions.html
    00:00
  • 119 07_soc-tools-and-their-features-practice-quiz_quiz.html
    00:00
  • 120 01_wrap-up_instructions.html
    00:00
  • 123 02_wrap-up.mp4
    00:00
  • 124 01_security-events-data-and-soc-analyst-tools-course-exam_exam.html
    00:00
  • 130 02_introduction-to-developing-key-relationships-with-internal-and-external.mp4
    00:00
  • 131 01_internal-stakeholders_instructions.html
    00:00
  • 134 02_internal-stakeholders.mp4
    00:00
  • 135 03_internal-stakeholder-summary-table_instructions.html
    00:00
  • 136 04_internal-stakeholders-practice-quiz_quiz.html
    00:00
  • 137 01_external-stakeholders_instructions.html
    00:00
  • 140 02_external-stakeholders.mp4
    00:00
  • 141 03_external-stakeholder-summary-table_instructions.html
    00:00
  • 142 04_external-stakeholders-practice-quiz_quiz.html
    00:00
  • 144 01_wrap-up_instructions.html
    00:00
  • 147 02_wrap-up.mp4
    00:00
  • 151 01_introduction-to-understanding-soc-metrics.mp4
    00:00
  • 152 02_introduction-to-understanding-soc-metrics_instructions.html
    00:00
  • 155 01_security-data-aggregation.mp4
    00:00
  • 156 02_security-data-aggregation_instructions.html
    00:00
  • 157 03_security-data-aggregation-practice-quiz_quiz.html
    00:00
  • 160 01_time-to-detection.mp4
    00:00
  • 161 02_time-to-detection_instructions.html
    00:00
  • 162 03_time-to-detection-practice-quiz_quiz.html
    00:00
  • 165 01_security-controls-detection-effectiveness.mp4
    00:00
  • 166 02_security-controls-detection-effectiveness_instructions.html
    00:00
  • 167 03_security-controls-detection-effectiveness-practice-quiz_quiz.html
    00:00
  • 170 01_soc-metrics.mp4
    00:00
  • 171 02_soc-metrics_instructions.html
    00:00
  • 172 03_soc-metrics-practice-quiz_quiz.html
    00:00
  • 173 01_wrap-up_instructions.html
    00:00
  • 176 02_wrap-up.mp4
    00:00
  • 180 01_introduction-to-understanding-soc-workflow-and-automation.mp4
    00:00
  • 181 02_introduction-to-understanding-soc-workflow-and-automation_instructions.html
    00:00
  • 184 01_soc-wms-concepts.mp4
    00:00
  • 185 02_soc-wms-concepts_instructions.html
    00:00
  • 186 03_definition-of-wms_instructions.html
    00:00
  • 187 04_workflow-types_instructions.html
    00:00
  • 188 05_repeatable-tasks_instructions.html
    00:00
  • 189 06_soc-wms-concepts-practice-quiz_quiz.html
    00:00
  • 192 01_incident-response-workflow.mp4
    00:00
  • 193 02_incident-response-workflow_instructions.html
    00:00
  • 194 03_incident-response-workflow-roles_instructions.html
    00:00
  • 195 04_incident-response-workflow-practice-quiz_quiz.html
    00:00
  • 198 01_soc-wms-integration.mp4
    00:00
  • 199 02_soc-wms-integration-overeview_instructions.html
    00:00
  • 200 03_soc-wms-integration_instructions.html
    00:00
  • 201 04_wms-integration-with-siem_instructions.html
    00:00
  • 202 05_wms-integration-approaches_instructions.html
    00:00
  • 203 06_soc-wms-integration-practice-quiz_quiz.html
    00:00
  • 206 01_soc-workflow-automation-example.mp4
    00:00
  • 207 02_soc-workflow-automation-example_instructions.html
    00:00
  • 208 03_soc-workflow-for-an-alert_instructions.html
    00:00
  • 209 04_wms-products_instructions.html
    00:00
  • 212 05_soc-workflow-automation-example.mp4
    00:00
  • 213 06_soc-workflow-automation-example-practice-quiz_quiz.html
    00:00
  • 216 01_wrap-up.mp4
    00:00

02. Endpoints and Systems

03. Network Security

04. Data Security

05. Threat Analysis

06. Threat Investigation

07. Threat Response

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?

×