Enterprise Security Operations for Effective Cyber Defense

Course Description

This course will give students a baseline knowledge of enterprise security operations. Content will explore models and architectures of Security Operation Centers (SOCs), including implementation of both preventative and detective technologies. Students will gain skills in vulnerability management by learning how to leverage kill chains, characterize threat actors, perform vulnerability scanning, and explore adversarial tactics/techniques/procedures (TTPs). In-depth understanding of SOC operations will be attained by understanding security operation roles along with challenges related to building, operating, and maintaining SOCs. Best practices will be promoted such as the use of open source tools, risk scoring, threat hunting, use cases, incident response plans, and defense-focused architectures. The course will be taught using a combination of lectures, interactive workshops, and hands-on labs.

Course ID: DEF 4623P
Course Format: Classroom

Available Classroom Sections

There are no available sections for this course. Please check back later.

View previous sections
View Previous Sections
CRN Start date End date Format Location Cost
18571 Mar 27, 2018 Mar 29, 2018 Classroom Atlanta, Georgia $1,895

Special Discounts

GTRI employees are eligible for a discount on this course.  If you are a GTRI employee, please go to https://webwise.gtri.gatech.edu/talent-management/organizational-development and look under “GT Professional Development” for a coupon code to use when checking out.

Note: Coupon codes must be applied during checkout and cannot be redeemed after your checkout is complete. Only one coupon code can be used per shopping cart.

Who Should Attend

Information security professionals and managers who are responsible for detecting, preventing, or responding to cyber attacks

How You Will Benefit

  • Explore current cyber threat actors, tactics, and techniques
  • Perform vulnerability scans and penetration tests
  • Identify issues and gaps with currently available security technologies and emulate attacks to test effectiveness
  • Explore SIEM technologies and capabilities
  • Explore SOC implementations, operations, and tools


  • Cyber Threats
  • Vulnerability Assessment and Penetration Testing
  • Cyber Threat Detection and Prevention
  • Security Information and Event Management (SIEM)
  • Security Operations Centers (SOC)

For Course-Related Questions

Please contact the course administrator: Renita Folds