1.2 General Cybersecurity Concepts
1.3 Introduction to SOC
1.4 SOC People
1.5 Introduction to SOC Services
1.6a Security Monitoring part 2
1.6 Security Monitoring part 1
1.7 Security Monitoring part 3
1.8 SOC Use Cases
1.9a Threat Intelligence pt2
1.9 Threat intelligence part 1
1.10 Threat Hunting Part 1
1.11 Threat Hunting Part 2
1.12a SOC Technologies Part 2
1.12 SOC Technologies Part 1
1.13 In Detail ELK Stack
1.14 SOC Tools
1.15 SOC Development And Maturity Levels
1.16 Lab Threat hunting walk-through
1.17 Lab WMI Consumer Hunting
1.18 Lab Linux Service Hunting
1.19 Lab Domain Name Hunting