Continuous Monitoring and Security Operations

Course Code: IFIS CDE/05

What You Will Learn?

  • Analyze a security architecture for deficiencies
  • Apply the principles learned in the course to design a defensible security architecture
  • Understand the importance of a detection-dominant security architecture and Security Operations Centers (SOC)
  • Identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM)
  • Determine appropriate security monitoring needs for organizations of all sizes
  • Implement robust Network Security Monitoring/Continuous Security Monitoring
  • Determine requisite monitoring capabilities for a SOC environment
  • Determine capabilities required to support continuous monitoring of key Critical Security Controls

$ 1200, 10 Days

Includes

  • Certificate of completion
  • Full access to study materials
  • Access to summit ACADEMY

Share via:

Laptop Requirements

  • CPU: 64-bit 2.0+ GHz processor or higher-based system is mandatory for this class (Important – Please Read: a 64-bit system processor is mandatory)
  • BIOS/UEFI: VT-x, AMD-V, or the equivalent must be enabled in the BIOS/UEFI
  • RAM: 8 GB (Gigabytes) of RAM or higher is mandatory for this class (Important – Please Read: 8 GB of RAM or higher is mandatory)
  • Wired Ethernet port (or adapter)
  • Wireless Ethernet 802.11 B/G/N/AC
  • USB 3.0 Ports Highly Recommended
  • Disk: 25 Gigabytes of free disk space
  • VMware Workstation 11, Workstation Player 7, or Fusion 7 (or newer)
  • A Linux and Windows 10 Virtual machine will be provided in class

About Course

This course will best position your organization to analyse threats and detect anomalies that could indicate cyber criminal behavior. The payoff for this new proactive approach would be early detection of an intrusion, or successfully thwarting the efforts of attackers altogether.

Learning Outcomes

You will learn;

  • Increase your understanding and enhance your skills in implementing Continuous Monitoring.
  • Timely incident detection
  • Combat cyber threats and prevent cyber attacks

Prerequisites

Prior condition for this course

  • Basic understanding of network protocols and devices
  • Experience with Linux and Windows from the command line

Course Outline

  • Current State Assessment, Security Operations Centers, and Security Architecture
  • Network Security Architecture
  • Network Security Monitoring
  • Endpoint Security Architecture
  • Automation and Continuous Security Monitoring

Target Audience

  • Security Architects
  • Senior Security Engineers
  • Technical Security Managers
  • SOC Analysts
  • SOC Engineers
  • SOC Managers
  • CND Analysts
  • Individuals working to implement Continuous Diagnostics and Mitigation (CDM), Continuous Security Monitoring (CSM), or Network Security Monitoring (NSM)

Duration and Fees

Duration: 10 days
Pricing: $1200

Need to know more?

Contact Our team and get all your questions  answered or you can request for a call back

Request a Callback

Talk to us on +256 414 231 136 or fill in these details below and request a callback

By providing your details, you agree to our privacy policy

Certifications

Follow Us

  • Summit Consulting Ltd, 4th Floor Ntinda Complex
  • Plot 33, Ntinda Road Opp St. Luke Church. P.O. Box 40292, Kampala, Uganda.
  • staff@forensicsinstitute.com
  • +256(414) 231136

© All rights reserved Institute od Forensics & ICT Security

Privacy Policy

Terms of Use | Site Map