Basic understanding of security components (Firewalls, IDS, IPS, SIEM, Malware detection). operating systems, networks, and protocols. Participation of training "Management of Cyber Crisis".
Objective
All affected areas, from management to IT departments, should understand the cyber range from an organizational and technical perspective. Here you will gain insights into the perspective and motivation of hackers: applying processes for responding to security incidents, understanding essential SIEM and security functions, identifying cyber attacks, documenting cyber attacks, communicating with 2nd and 3rd level support and with company management.
Comment
Security Operations Centers (SOCs) play a key role in detecting and defending against cyberattacks. Due to the complex interplay of technology, processes, and people, a targeted approach to setting up and operating a SOC is crucial for detection and response capabilities. This training is the first part of a three-part series for SOC employees and takes place in a virtual environment, with discussions on a joint approach in teams against advanced hacker attacks.
Target group
Forensic scientists, Managers, Internet/data protection/security officers, Network administrators, PC user service, Security experts