Mastering SOC Operations - Log Analysis, Threat Intel and Vulnerability Detection - Day 2
INFOSEC TRAIN via YouTube
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
NY State-Licensed Certificates in Design, Coding & AI — Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This video tutorial continues the SOC Analyst Essentials series, focusing on three critical components of Security Operations Center work: vulnerability management, log analysis, and threat intelligence. Dive into the vulnerability assessment process and management lifecycle, explore various log sources and learn practical techniques for identifying anomalies in logs. Discover the crucial role of threat intelligence in cybersecurity, including different types of intelligence and an introduction to threat intelligence platforms and tools. The 79-minute session provides practical knowledge essential for aspiring SOC analysts, demonstrating how these three pillars work together to detect threats before they become breaches. Perfect for cybersecurity professionals looking to understand how vulnerability management, log analysis, and threat intelligence function together in real-world security environments.
Syllabus
Mastering SOC Operations | Log Analysis, Threat Intel & Vulnerability Detection | Day 2
Taught by
INFOSEC TRAIN