Home / Course catalog / Cyber Security SOC Analyst - Netwo... (SOCANALYST1)

Cyber Security SOC Analyst - Network Attacks from Scratch (SOCANALYST1)

SOC


Description

What is SOC Analyst Training ?

★ As cyber attacks are rising, Companies are providing SOC Services or building Security Operation Center in which SOC Team is responsible for the Detection, Investigation & Remediation of all kinds of Cyber attacks on Network, System and Applications.
★ There is very demand for SOC Analyst (L1) and Sr SOC Analyst (L2) in Security Operation Center.
★ Analyst is responsible to monitor the company infrastructure in 24*7 and respond to all kind of cyber attacks.
★ Analyst works on SIEM tool for monitoring and analysis of cyber attack.
★ You will learn about working of devices, protocol, ports and services.
★ Yo will learn about the real world cyber attacks and investigating on attacks with the help of network packet and device log.
★ You will learn about the day to day activity performed by Analyst in their job and learn about various attacks and remediation from very basic.

Why Should You Join Us ?

★ There can be multiple reasons for unemployment.
★ Institute did not deliver the training for what they promised.
★ The trainer has only teaching experience. No professional working experience.
★ No prior tool knowledge of SIEM solution
★ Lack of confidence in cracking the interview.
★ Lack of knowledge to answer the puzzling interview question.
★ Unable to understand the scenario based interview question.

What We Are Offering ?

★ We are providing training on Technology (Real world Cyber Attacks) + Tool (SIEM)
★ You will learn the tool on which most of the cyber security professionals are working.
★ You will learn the technology on which cyber security works and step followed by professionals to stop and prevent attacks in real time.
★ You will face the real challenge faced by professionals in their job responsibilities.
★ You will be able to answer the complicated interview question from our training.
★ You will work as same as a professional are working and will increase your confidence for cracking any cyber security interview.

★Lifetime access to the training on your device (Mobile, Laptop, Tablet etc.)

★You will join your dream companies at your choice of package.

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • What is Networking sample
  • Section 1
  • Lecture 2 - Basics Of Networks
  • Lecture 3 - OSI Model & TCP IP Protocol Suite
  • Lecture 4 - Types Of Network Device & Working
  • Lecture 5 : Types Of Network Security Device & Working
  • Section 2
  • Lecture 6 - Bit, Bytes and Hexadecimal Representation
  • Lecture 7 : MAC & IP Address
  • Lecture 8 - Network Address Translation
  • Lecture 9 - Port Address Translation
  • Lecture 10 : Wireshak & Tshark
  • Section 3
  • Lecture 11 - IP Protocol and IP header
  • Lecture 12 - IP header fields
  • Lecture 13 - Transport layer and Transport protocols
  • Lecture 14 - TCP Header Fields
  • Lecture 15 - Cyber Attacks on Internet & Transport Layer
  • Section 4
  • Lecture 16 - UDP Protocol & UDP Header
  • Lecture 17 - UDP Header Fields
  • Lecture 18 - ICMP Protocol and ICMP Header
  • Lecture 19 - ICMP Header Fields
  • Lecture 20 - Cyber attacks with UDP & ICMP Protocol
  • Section 5
  • Lecture 21 - Protocls and Ports
  • Lecture 22 - ARP Protocol
  • Lecture 23 - Client Server Model
  • Lecture 24 - HTTP Service
  • Lecture 25 - DHCP
  • Lecture 26 - DNS.mp4
  • Lecture 27 - Basics of FTP_ Telnet_ SSH _ SMTP 2
  • Section 6
  • Lecture 28 - Cyber Attack & Prevention For DNS Zone Transfer
  • Lecture 29 - Cyber Attack & Prevention For Host Discovery Attack
  • Lecture 30 - Cyber Attack & Prevention for Port Scanning
  • Lecture 31 - Cyber Attacks & Prevention For VA Scanning
  • Lecture 32 - Cyber Attacks & Prevention For ARP Poisiong
  • Lecture 33 - Cyber Attacks & Prevention For DDOS Attacks
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever