Mastering SOC Operations - Log Analysis, Threat Intel and Vulnerability Detection - Day 2
INFOSEC TRAIN via YouTube
40% Off Career-Building Certificates
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This video tutorial continues the SOC Analyst Essentials series, focusing on three critical components of Security Operations Center work: vulnerability management, log analysis, and threat intelligence. Dive into the vulnerability assessment process and management lifecycle, explore various log sources and learn practical techniques for identifying anomalies in logs. Discover the crucial role of threat intelligence in cybersecurity, including different types of intelligence and an introduction to threat intelligence platforms and tools. The 79-minute session provides practical knowledge essential for aspiring SOC analysts, demonstrating how these three pillars work together to detect threats before they become breaches. Perfect for cybersecurity professionals looking to understand how vulnerability management, log analysis, and threat intelligence function together in real-world security environments.
Syllabus
Mastering SOC Operations | Log Analysis, Threat Intel & Vulnerability Detection | Day 2
Taught by
INFOSEC TRAIN