Here, you will understand the goals, objectives, and summary of the entire course. You will get to know the author, his areas of expertise and his accomplishments. In this section, you will learn how to setup the lab environment to get started.
Enterprise Security Operations
In this section, you will start learning about Security Operations Center. You will also learn what they are, how the functions, and what they do.
Hacker Tactics, Techniques, and Procedures
In this section, you will start learning about Security Operations Center. You will also learn what they are, how the functions, and what they do.
Defensive Tools for the Modern Enterprise
In this section, you will learn various practices that organizations use to protect their sensitive data.
Event Monitoring and Threat Hunting
This section will teach you some other advanced practices being followed at various organizations as their security measures.
Vulnerability Management
Vulnerability can be easily used to enter your organizations security systems and steal or misuse your data. We will learn about vulnerabilties in this lesson.
Incident Response
Incident means any situation that appears and needs attention. This section will teach you about incidents and how to deal with them