Have any questions? info@rmg-sa.com +966112385335
  • Knowledge Center
    • Cyber Security Risk Management
    • Risk Management
    • Risk Management for the C-Suite
  • Who We Are
  • Contact
images
  • Home
  • Technical Training
    Courses By Topics
    • Networking
    • Programming
    • Cybersecurity
    • Operating Systems
    • Cloud Computing
    • Data Center
    • IT Service management
    • IT Goverannce
    • Enterprice Architecture
    • Business Analysis
    • Digital Marketing
    Courses By Vendor & Certification
    • Microsoft Training
    • Oracle Training
    • Cisco Training
    • CompTIA Training
    • IBM Training
    • ITIL® Training
    • AXEOLS Training
    • COBIT® Training
    • Vmware
    • Agile Training
    • Scrum Training
    • TOGAF® Training
    • DASA DevOps Training
  • Business Training
    • Project management
    • Quality management
    • Leardership & Management Skills
  • Consultancy Services
    • IT Consultancy
    • Business Consultancy
  • Examination
  • You are here:
  • Home
  • Technical Training
  • Cybersecurity
  • CISCO - Implementing Cisco Cybersecurity Operations (SECOPS)

CISCO - Implementing Cisco Cybersecurity Operations (SECOPS)

This course allows learners to understand how a Security Operations Center (SOC) functions and the introductory-level skills and knowledge needed in this environment. It focuses on the introductory-level skills needed for a SOC Analyst at the associate level.

Specifically, understanding basic threat analysis, event correlation, identifying malicious activity, and how to use a playbook for incident response.

  • Objectives
  • Outline
  • Audience
  • Duration

Upon completion of this course, you will be able to:

  • Define a SOC and the various job roles in a SOC
  • Understand SOC infrastructure tools and systems
  • Learn basic incident analysis for a threat centric SOC
  • Explore resources available to assist with an investigation
  • Explain basic event correlation and normalization
  • Describe common attack vectors
  • Learn how to identifying malicious activity
  • Understand the concept of a playbook
  • Describe and explain an incident respond handbook
  • Define types of SOC Metrics
  • Understand SOC Workflow Management system and automation

Module 1: SOC Overview

    • Lesson 1: Defining the Security Operations Center
    • Lesson 2: Understanding NSM Tools and Data
    • Lesson 3: Understanding Incident Analysis in a Threat-Centric SOC
    • Lesson 4: Identifying Resources for Hunting Cyber Threats

Module 2: Security Incident Investigations

    • Lesson 1: Understanding Event Correlation and Normalization
    • Lesson 2: Identifying Common Attack Vectors
    • Lesson 3: Identifying Malicious Activity
    • Lesson 4: Identifying Patterns of Suspicious Behavior
    • Lesson 5: Conducting Security Incident Investigations

Module 3: SOC Operations

  • Lesson 1: Describing the SOC Playbook
  • Lesson 2: Understanding the SOC Metrics
  • Lesson 3: Understanding the SOC WMS and Automation
  • Lesson 4: Describing the Incident Response Plan
  • Lesson 5: Appendix A—Describing the Computer Security Incident Response Team
  • Lesson 6: Appendix B—Understanding the use of VERIS
  • Security Operations Center – Security Analyst
  • Computer/Network Defense Analysts
  • Computer Network Defense Infrastructure Support Personnel
  • Future Incident Responders and Security Operations Center (SOC) personnel
  • Students beginning a career, entering the cybersecurity field
  • Cisco Channel Partners
5 Days
  • CISCO - Understanding Cisco Cybersecurity Fundamentals (SECFND)
  • CISCO - Implementing Cisco Cybersecurity Operations (SECOPS)
Have any questions? info@rmg-sa.com +966112385335 Rihanna Almlqa boulevard -First Floor-Office No. 53
rmg-logo

RMG, a leading Saudi System integrator, offers superior products and services that enable organizations to keep pace with the evolving changes in today's competitive business environment

  • Home
  • Technical Training
  • Knowledge Center
  • Business Training
  • Who We Are
  • Examination
  • Contact
  • Consultancy Services

Please enter an email field You should enter a valid mail address

Copyright © 2025 RMG. All rights reserved.