Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Google

SecOps on GDC for Tier 3 Analysts

Google via Google Skills

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course gives you a deep dive into the workflows of Tier 3 analysts.

Syllabus

  • Course Overview
    • Course 3 Overview
  • Advanced Incident Response
    • Module overview
    • Advanced incident response for Tier 3 analysts
    • Ad hoc incident response
    • Using an incident management plan for ad hoc incident response
    • Tools for advanced incident response
    • Endpoint Detection and Response (EDR) tools
    • Security Information and Event Management (SIEM) tools
    • Vulnerability scanners
    • Threat intelligence tools
    • Intrusion Detection and Prevention Systems (IDPS) tools
    • Digital forensic tools
    • Advanced incident response tools at Cymbal Federal
    • Metrics for evaluating incident response
  • Vulnerability management for Tier 3 analysts
    • Module overview
    • Introduction to vulnerability management
    • Vulnerability management systems (VMS)
    • The vulnerability management lifecycle
    • Vulnerability management on GDC
    • Techniques for vulnerability management
    • Vulnerability assessment
    • Vulnerability scanning
    • Penetration testing
    • Tools for penetration testing
    • Best practices for a vulnerability management program
    • Vulnerability management reports
    • Module summary
    • Knowledge check
  • Threat Modeling
    • Module overview
    • The modern threat landscape
    • Introduction to threat modeling
    • The threat modeling process
    • Threat modeling frameworks
    • Threat modeling frameworks at Cymbal Federal
    • Threat intelligence feeds
    • Introduction to modeling techniques
    • Spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE)
    • STRIDE at Cymbal Federal.mp4
    • Process for Attack Simulation and Threat Analysis (PASTA)
    • PASTA at Cymbal Federal
    • Common Vulnerability Scoring System (CVSS)
    • CVSS at Cymbal Federal
    • Selecting a threat modeling technique
    • SecOps-specific tools for threat modeling
    • SecOps-specific tools at Cymbal Federal
    • Threat mapping
    • Best practices for effective threat
    • Module summary
    • Knowledge check
  • Security Engineering
    • Module overview.mp4
    • Introduction to security engineering
    • The Secure by Design approach
    • Secure by Design and SecOps
    • Security engineers in the SOC
    • The security engineering workflow
    • Introduction to security controls
    • Technical security controls
    • Administrative security controls
    • Tools for security engineers
    • Security engineering best practices
    • Module review
    • Knowledge check
  • Splunk advanced: Lite management
    • Module overview
    • Introduction to Splunk management
    • Who is responsible for managing Splunk?
    • Configuration files in Splunk
    • Administering Splunk with Splunk Web and btool
    • Best practices and advanced troubleshooting in Splunk
    • Splunk management at Cymbal Federal
    • Module review
    • Knowledge check
  • Resources
    • Course slides
    • Additional resources
  • Your Next Steps
    • Course Badge

Reviews

Start your review of SecOps on GDC for Tier 3 Analysts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.