Szczegółowy program szkolenia
- Understanding Risk Management and SOC Operations
 - Understanding Analytical Processes and Playbooks
 - Investigating Packet Captures, Logs, and Traffic Analysis
 - Investigating Endpoint and Appliance Logs
 - Understanding Cloud Service Model Security Responsibilities
 - Understanding Enterprise Environment Assets
 - Implementing Threat Tuning
 - Threat Research and Threat Intelligence Practices
 - Understanding APIs
 - Understanding SOC Development and Deployment Models
 - Performing Security Analytics and Reports in a SOC
 - Malware Forensics Basics
 - Threat Hunting Basics
 - Performing Incident Investigation and Response