Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mastering SOC Operations - Log Analysis, Threat Intel and Vulnerability Detection - Day 2

INFOSEC TRAIN via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This video tutorial continues the SOC Analyst Essentials series, focusing on three critical components of Security Operations Center work: vulnerability management, log analysis, and threat intelligence. Dive into the vulnerability assessment process and management lifecycle, explore various log sources and learn practical techniques for identifying anomalies in logs. Discover the crucial role of threat intelligence in cybersecurity, including different types of intelligence and an introduction to threat intelligence platforms and tools. The 79-minute session provides practical knowledge essential for aspiring SOC analysts, demonstrating how these three pillars work together to detect threats before they become breaches. Perfect for cybersecurity professionals looking to understand how vulnerability management, log analysis, and threat intelligence function together in real-world security environments.

Syllabus

Mastering SOC Operations | Log Analysis, Threat Intel & Vulnerability Detection | Day 2

Taught by

INFOSEC TRAIN

Reviews

Start your review of Mastering SOC Operations - Log Analysis, Threat Intel and Vulnerability Detection - Day 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.