Efficacy. Trust. Sustainability.

SOC – Security Operations Center Training


  • Basic to Intermediate Linux Knowledge
  • 3 + Years of direct SOC experience


  • 3 to 5 Days based on Client Requirement

Investment Protection Guarantee:

  • 8/10
  • Measurable changes in Incident Response Capabilities of SOC Engineers

Course Summary:

  • SOC Functions and Procedures
  • SOC – Must Know Network & Security Infrastructure devices
  • Security Monitoring: Network Security Monitoring (NSM)
  • Continuous Security Monitoring (CSM) Incident Response

Course Outline:

  • SOC Functions and Procedures
  • SOC Practices
  • SOC Must know network and end-point security infrastructure devices
  • Security monitoring – NSM (Network Security Monitoring)
  • CSM – Continuous Security Monitoring
  • Monitoring, Patching & Vulnerability Management
  • Incident Response

Who should attend?

  • Cybersecurity Professionals
  • Cybersecurity Engineers
  • Threat Analysts
  • Incident Responders
  • Chief Information Security Officers (CISO)
  • Chief Technology Officers (CTO)
  • Chief Information Officers (CIO)

How is this going to be helpful?

  • Take a more integrated approach to security using the tips and tricks presented at the Summit.
  • Integrate the SOC so that it works effectively with the IT help-desk, IT operations, and management
  • Automate detection and response inside your SOC
  • Reduce chaos and increase effectiveness during a crisis
  • Properly identify, train, challenge, and retain SOC personnel and operators
  • Discuss how policies need to reflect operations and reality
  • Build trust inside the organization
  • Operationalize your security processes, reporting, metrics, and policies - that is, what works and what doesn't
  • Evaluate the tools and capabilities needed to make cybersecurity work effectively

Darkhotel’s attacks in 2015

Darkhotel APT attacks dated 2014 and earlier are characterized by the misuse of... Readmore

Kaspersky Lab sheds light on “Darkhotels”

Kaspersky Lab’s Global Research and Analysis Team experts researched the...Readmore

Visa Security Bulletin

According to recent forensic investigations, small merchants remain targets... Readmore