وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Security Operations (SOC) 101

سرفصل های دوره

01-Introduction
  • 1. Course Introduction
  • 2. Prerequisites and Course Resources
  • 2. Prerequisites and Course Resources.txt
  • 3. Course Discord and Support

  • 02-Lab-Setup
  • 1. Installing Oracle VM VirtualBox
  • 1. Installing Oracle VM VirtualBox.txt
  • 2. Installing Windows
  • 3. Configuring Windows
  • 3. Configuring Windows.txt
  • 4. Installing Ubuntu
  • 4. Installing Ubuntu.txt
  • 5. Configuring Ubuntu
  • 5. Configuring Ubuntu.txt
  • 6. Configuring the Lab Network

  • 03-Security-Operations-Fundamentals
  • 1. The SOC and Its Role
  • 2. Day in the Life of a SOC Analyst
  • 3. Information Security Refresher
  • 4. SOC Models, Roles, and Organizational Structures
  • 5. Incident and Event Management
  • 6. SOC Metrics
  • 7. SOC Tools
  • 8. Common Threats and Attacks
  • 8. Common Threats and Attacks.txt

  • 04-Phishing-Analysis
  • 1. Introduction to Phishing
  • 1. Introduction to Phishing.txt
  • 2. Email Fundamentals
  • 3. Phishing Analysis Configuration
  • 3. Phishing Analysis Configuration.txt
  • 4. Phishing Attack Types
  • 5. Phishing Attack Techniques
  • 5. Phishing Attack Techniques.txt
  • 6. Email Analysis Methodology
  • 7. Email Header and Sender Analysis
  • 7. Email Header and Sender Analysis.txt
  • 8. Email Authentication Methods
  • 9. Email Content Analysis
  • 10. The Anatomy of a URL
  • 11. Email URL Analysis
  • 11. Email URL Analysis.txt
  • 12. Email Attachment Analysis
  • 12. Email Attachment Analysis.txt
  • 13. Dynamic Attachment Analysis and Sandboxing
  • 13. Dynamic Attachment Analysis and Sandboxing.txt
  • 14. Static MalDoc Analysis
  • 14. Static MalDoc Analysis.txt
  • 15. Static PDF Analysis
  • 15. Static PDF Analysis.txt
  • 16. Automated Email Analysis with PhishTool
  • 17. Reactive Phishing Defense
  • 17. Reactive Phishing Defense.txt
  • 18. Proactive Phishing Defense
  • 19. Documentation and Reporting
  • 19. Documentation and Reporting.txt
  • 20. Phishing Analysis Challenge 1.txt
  • 21. Phishing Analysis Challenge 2.txt
  • 22. Phishing Analysis Challenge 3.txt
  • 23. Additional Practice

  • 05-Network-Security
  • 1. Introduction to Network Security
  • 2. Network Security Theory
  • 3. Packet Capture and Flow Analysis
  • 4. Introduction to tcpdump
  • 5. tcpdump - Capturing Network Traffic
  • 6. tcpdump - Analyzing Network Traffic
  • 7. tcpdump - Analyzing Network Traffic (Sample 2)
  • 8. tcpdump Challenge 1.txt
  • 9. Introduction to Wireshark
  • 9. Introduction to Wireshark.txt
  • 10. Wireshark - Capture and Display Filters
  • 10. Wireshark - Capture and Display Filters.txt
  • 11. Wireshark - Statistics
  • 12. Wireshark - Analyzing Network Traffic
  • 13. Wireshark Challenge 1.txt
  • 14. Intrusion Detection and Prevention Systems
  • 15. Introduction to Snort
  • 16. Snort - Reading and Writing Rules
  • 16. Snort - Reading and Writing Rules .txt
  • 17. Snort - Intrusion Detection and Prevention
  • 18. Snort Challenge 1.txt
  • 19. Additional Practice
  • 19. Additional Practice.txt

  • 06-Endpoint-Security
  • 1. Introduction to Endpoint Security
  • 2. Endpoint Security Controls
  • 3. Creating Our Malware
  • 3. Creating Our Malware.txt
  • 4. Windows Network Analysis
  • 5. Windows Process Analysis
  • 6. Windows Core Processes (Part 1)
  • 7. Windows Core Processes (Part 2)
  • 8. The Windows Registry
  • 9. Windows Autoruns (Part 1)
  • 9. Windows Autoruns (Part 1).txt
  • 10. Windows Autoruns (Part 2)
  • 10. Windows Autoruns (Part 2).txt
  • 11. Windows Service Analysis
  • 12. Windows Scheduled Tasks
  • 13. Windows Endpoint Analysis Challenge 1.txt
  • 14. Windows Event Logs
  • 14. Windows Event Logs.txt
  • 15. Windows Events Challenge 1.txt
  • 16. Introduction to Sysmon
  • 17. Sysmon Events
  • 17. Sysmon Events.txt
  • 18. Linux Network Analysis
  • 19. Linux Process Analysis
  • 20. Linux Cron Jobs
  • 21. Linux Endpoint Analysis Challenge 1.txt
  • 22. Introduction to LimaCharlie
  • 23. LimaCharlie - Endpoint Detection and Response
  • 24. LimaCharlie - Deploying Endpoint Agents
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44955
    حجم: 8879 مگابایت
    مدت زمان: 2790 دقیقه
    تاریخ انتشار: ۲ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید