Skip to content
Play overlay
Preview this course

Cyber Security : Cyber Security Centre

Free eCertificate | Limited time | Tutor Support | Video Lessons


Frontier Education

Summary

Price
£12 inc VAT
Study method
Online, On Demand What's this?
Duration
20.2 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free
Additional info
  • Tutor is available to students

2 students purchased this course

Add to basket or enquire

Overview

This course enables you to give a successful interview with a Cybersecurity firm for the position of Analyst in a SOC team or moving further. This curriculum teaches your technical capability right from the beginning. In the first few sections, it deals with the foundations and fundamentals of IT security,SOC, networking SIEM, and Splunk.

What you'll learn

  • This course will help build your technical competence so that you can start a career as an analyst in a Security Operations Center team
  • You will go through an introduction of what a security operations center is, branches within cyber security and the various job roles available
  • You will understand network concepts, network topologies and layered communication in this course
  • You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
  • You will learn OSI Model, various mnemonics, protocol data units etc, will go through the various layers in detail with real time examples and caselets
  • You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
  • You will identify threats, possible breaches & collect audit logs for security and compliance. You will be able to conduct investigations and provide evidence.

Frontier Education provides working professionals, or those with no previous experience, with trailblazing, practice-based teaching, aimed to inspire and prepare you for a career in cyber security or related professions.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Curriculum

1
section
42
lectures
20h 10m
total
    • 1: Video 01 Security Operations Center - SOC Promotional Video Preview 00:41
    • 2: Video 2 SOC Part 1 07:04
    • 3: Video 3 SOC Part 2 04:25
    • 4: Video 5 SOC Part 4 48:51
    • 5: Video 7 SOC Part6 1:51:38
    • 6: Video 8 Section 1 Network Concepts Refresher 16:02
    • 7: Video 9 Section 2 OSI Continued 40:40
    • 8: Video 10 Section 3 OSI Continued 20:53
    • 9: Video 11 Section 4 TCPIP Protocol Suite 39:25
    • 10: Video 13 Session 3 Section 2 Ethical Hacking 08:21
    • 11: Video 14 Session3 Section 3 DoS DDoS 27:04
    • 12: Video 15 Session3 Section 4 SYN Flooding Attack using HPing3 15:24
    • 13: Video 16 Session3 Section 5 Counter Measures 10:38
    • 14: Video 17 Session3 Section 6 Metasploit Test 09:43
    • 15: Video 18 Session4 Section 1 Maltego 15:29
    • 16: Video 19 Session4 Section 2 Cyber Kill Chain Methodology 19:59
    • 17: Video 20 Session4 Section 3 Information Security Attack Vectors 15:28
    • 18: Video 21 Session4 Section 4 Ransomware 41:41
    • 19: Video 22 Session4 Section 5 Web Application Security 34:00
    • 20: Video 23 Session5 Section1 SIEM 06:55
    • 21: Video 24 Session5 Section2 Key Objectives 01:56
    • 22: Video 25 Session5 Section3 Defence in Depth 04:22
    • 23: Video 26 Session5 Section4 Corporate Environment 04:00
    • 24: Video 27 Session5 Section5 Log Management 11:15
    • 25: Video 28 Session5 Section6 Why is SIEM Necessary 10:25
    • 26: Video 29 Session5 Section7 Use Cases 17:02
    • 27: Video 30 Session5 Section8 Elements of SIEM 42:10
    • 28: Video 31 Session5 Section9 SIEM Deployment Options 28:41
    • 29: Video 32 Session5 Section10 Splunk Introduction 25:48
    • 30: Video 33 Session5 Section11 Splunk UI Introduction 1:35:48
    • 31: Video 34 Session5 Section12 Basic Transforming Commands 07:38
    • 32: Video 35 Session5 Section13 Creating Reports and Dashboards 23:02
    • 33: Video 36 Session5 Section14 Saving and Sharing Reports 04:23
    • 34: Video 37 Session5 Section15 Dashboards 09:18
    • 35: Video 38 Session5 Section16 Creating Alerts 44:16
    • 36: Video 39 Splunk ES Session 1 1:15:36
    • 37: Video 40 Splunk ES Session 2 45:35
    • 38: Video 41 Splunk ES Session 3 58:40
    • 39: Video 42 Cyber security incidence response 37:42
    • 40: Video 43 Email SMTP, Email system, webmail architecture - IMAP4 based 33:20
    • 41: Video 44 Virus, Other Types _ Anti-Virus 1:14:51
    • 42: Video 45 Vulnerability Mgmt 58:56

Course media

Description

In this Cyber security-security operations center course, you will learn and understand the core theories and practices so you are prepared for the jobs.This course is designed for anyone who wants to understand concepts and build competencies for the career.

Course curriculum:

1) Importance of learning SOC

2) What curriculum is covered?

3) Security Triad: Confidentiality, Integrity & Availability

4) Computer Network, Topologies

5) Network Footprinting

6) Network Concepts Refresher, OSI, TCPIP Protocol Suite

7) Cyber Security Attacks, Ethical Hacking, DoS, DDoS, SYN Flooding, Metasploit

8) Maltego, Cyber Killchain methodology, Information security vectors, Ransomware

9) SIEM: Security Information and Event Management

10) Enterprise Splunk

11) Fortinet's FortiSIEM

12) Incidence Response, Email system, Virus, and Vulnerability Management

Frontier Education’s vision is to enhance the learning and employability of every learner and ensure that employers and students can access the skills they need to compete in the global digital economy. This initiative means that the Frontier Education is ideally placed to help you develop the knowledge and skills that employers need the most, in order to advance your career goals.

Top reasons to Study Online at Frontier Education

    • Tailor made: Course adapted to market needs and interests
    • Flexible programs: study and work at your own pace on easy-to-use web platforms
    • Online education: progressive teaching methods with video or easy to understand medium
    • Multicultural: connect with classmates from all corners of the globe

Who is this course for?

  • You are aiming for roles such as IT Security Analyst, Cybersecurity Analyst for L1, L2 positions
  • You have a drive towards a career in the security operations center

Requirements

No prior knowledge or experience required

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.