Protecting confidentiality and integrity of data as well as availability of key technology systems is crucial for running any business in the bold and new hyper-connected universe. An effective Security Operations Center (SOC) is a primary means and plays a key role to achieve these goals. As the newer technologies like machine learning, IoT, Blockchain, autonomous and connected vehicles, automation and others are becoming crucial for business success, concept of a modern SOCis also going through an evolution process to manage risk with traditional and emerging technologies.

Course Objectives

  • Building business case for SOC
  • SOC planning and defining scope
  • Log sources
  • SOC technology stack
  • Incorporating threat intelligence
  • SOC processes
  • Governance models
  • Performance and metrics
  • Continuous improvement

Pre-requisites

Basic understanding of informations security or network operations

Course Benefits

  • Understand what it takes to build a SOC
  • Learn how to operate a SOC efficiently
  • Avoid common pitfalls

Contact for more information