Become a highly skilled and sought-after SOC (Security Operations Center) Analyst or Team Member with our HDN Certified training program. This comprehensive course equips you with the knowledge and practical skills needed to excel in the field of cybersecurity.
You’ll learn how to effectively monitor and respond to security incidents, detect and mitigate threats, and work collaboratively within a SOC team. Gain hands-on experience with cutting-edge tools and techniques, and develop the expertise necessary to safeguard organizations from cyber threats.
Elevate your career and enhance your cybersecurity capabilities with the HDN Certified SOC Analyst / Team Member course. Join us on the path to becoming a trusted defender of digital assets.
1
Lecture 1:Introduction to Machine Learning and AI for Security
2
Lecture 2: Fundamentals of ChatGPT and GPT4all
3
Lecture 3: AI Tools for Security
4
Lecture 4: Search Capabilities Optimization with GPT4all Plugins
5
Lecture 5: Securing AI Models and Data
6
Lecture 6: AI Security Evaluation
7
Lecture 7: Real-World AI Applications Use Cases
8
Lecture 8: Trends and Challenges in AI Security
9
Assignment 1:Final Exam
10
Lecture 1:Introduction
11
Lecture 2:Emerging Threat Landscape
12
Lecture 3:Implementing Cyber Risk Management
13
Lecture 4:Classifying Information and Data, DLP
14
Lecture 5:Compliance and Governance
15
Lecture 6:Security, Privacy, Regulatory & Compliance Controls
16
Lecture 7:Access Controls, IAM & PAM
17
Lecture 8:Using the MITRE ATT@CK Framework
18
Lecture 9:Defining a Security Operations Center
19
Lecture 10: People, Personnel Development, Retention and Attracting Talent for a SOC
20
Lecture 11:SOC PROCESSES
21
Lecture 12:Select SOC PROCEDURES
22
Lecture 13:Dashboards & Use Cases
24
Lecture 15:Continuous Training
25
Lecture 16:Secure Code Review & Application Security
26
Lecture 17:Security Monitoring
27
Lecture 18:Introduction To Threat-Hunting
28
Lecture 19:Threat-Hunting Step-by-Step
29
Lecture 20:Threat Intelligence: The Intelligence Lifecycle
30
Lecture 21:Threat Intelligence: Step-by-Step
31
Lecture 22:Common Security & SOC Use-Cases
32
Lecture 23:Open-Source Intelligence (OSINT)
33
Lecture 24:Splunk & Elastic Search as SOC Dashboards
34
Lecture 25:SOC Tabletop Exercises
35
Lecture 26:Offensive Security
36
Lecture 27:Cloud Computing Security
37
Lecture 28:Firewalls, IDS, IPS, UTM & Firewall Rule Management
39
Lecture 1:Introduction
40
Lecture 2:Understanding the Threat Landscape
41
Lecture 3:Introduction to Threat Hunting
42
Lecture 4:Threat Hunting Techniques
43
Lecture 5:Building a Threat-Hunting Program
44
Lecture 6:Threat Intelligence
45
Lecture 7:Threat Intelligence Sources
46
Lecture 8:Threat Intelligence Platforms
47
Lecture 9:Threat Intelligence Sharing
48
Lecture 10:Introduction to EDR
49
Lecture 11:EDR Capabilities
50
Lecture 12:EDR Implementation
51
Lecture 13:EDR Integration with Other Tools
52
Lecture 14:EDR Use Cases
53
Lecture 15:Threat Hunting with EDR
54
Lecture 16:Threat Intelligence with EDR
55
Lecture 17:EDR and Incident Response
56
Lecture 18:EDR and Compliance
57
Lecture 19:EDR and Cloud Security
58
Lecture 20:EDR and Endpoint Security
59
Lecture 21:Future of Threat Hunting, Threat Intelligence, and EDR
60
Lecture 22: Opensource Tools and Solutions forThreat Hunting, Threat Intelligence, and EDR