Continuous Monitoring and Security Operations

Course Code: IFIS/SCA/CS001

About this Course

This course will best position your organization to analyse threats and detect anomalies that could indicate cyber criminal behavior. The payoff for this new proactive approach would be early detection of an intrusion, or successfully thwarting the efforts of attackers altogether.

What You Will Learn?

  • Analyze a security architecture for deficiencies
  • Apply the principles learned in the course to design a defensible security architecture
  • Understand the importance of a detection-dominant security architecture and Security Operations Centers (SOC)
  • Identify the key components of Network Security Monitoring (NSM)/Continuous Diagnostics and Mitigation (CDM)/Continuous Monitoring (CM)
  • Determine appropriate security monitoring needs for organizations of all sizes
  • Implement robust Network Security
  • Monitoring/Continuous Security Monitoring
  • Determine requisite monitoring capabilities for a SOC environment
  • Determine capabilities required to support continuous monitoring of key Critical Security Controls

Laptop Requirements

  • CPU: 64-bit 2.0+ GHz processor or higher-based system is mandatory for this class (Important – Please Read: a 64-bit system processor is mandatory)
  • BIOS/UEFI: VT-x, AMD-V, or the equivalent must be enabled in the BIOS/UEFI
  • RAM: 8 GB (Gigabytes) of RAM or higher is mandatory for this class (Important – Please Read: 8 GB of RAM or higher is mandatory)
  • Wired Ethernet port (or adapter)
  • Wireless Ethernet 802.11 B/G/N/AC
  • USB 3.0 Ports Highly Recommended
  • Disk: 25 Gigabytes of free disk space
  • VMware Workstation 11, Workstation Player 7, or Fusion 7 (or newer)
  • A Linux and Windows 10 Virtual machine will be provided in class

Learning Outcomes

You will learn;

  • Increase your understanding and enhance your skills in implementing Continuous Monitoring.
  • Timely incident detection
  • Combat cyber threats and prevent cyber attacks


Prior condition for this course

  • Basic understanding of network protocols and devices
  • Experience with Linux and Windows from the command line

Course Outline

  • Current State Assessment, Security Operations Centers, and Security Architecture
  • Network Security Architecture
  • Network Security Monitoring
  • Endpoint Security Architecture
  • Automation and Continuous Security Monitoring

Target Audience

  • Security Architects
  • Senior Security Engineers
  • Technical Security Managers
  • SOC Analysts
  • SOC Engineers
  • SOC Managers
  • CND Analysts
  • Individuals working to implement Continuous Diagnostics and Mitigation (CDM), Continuous Security Monitoring (CSM), or Network Security Monitoring (NSM)

Duration and Fees

Duration: 5 days
Pricing: $500

Subscribe to Our Newsletters

Scroll to Top