Enterprise Security Operations for Effective Cyber Defense

  • Overview
  • Course Content

Enterprise Security Operations for Effective Cyber Defense

Course Description

This course will give students a baseline knowledge of enterprise security operations. Content will explore models and architectures of Security Operation Centers (SOCs), including implementation of both preventative and detective technologies. Students will gain skills in vulnerability management by learning how to leverage kill chains, characterize threat actors, perform vulnerability scanning, and explore adversarial tactics/techniques/procedures (TTPs). In-depth understanding of SOC operations will be attained by understanding security operation roles along with challenges related to building, operating, and maintaining SOCs. Best practices will be promoted such as the use of open source tools, risk scoring, threat hunting, use cases, incident response plans, and defense-focused architectures. The course will be taught using a combination of lectures, interactive workshops, and hands-on labs.

Course Content


  • SOC introduction
  • Current state of cyber threats
  • Cyber threat actors
  • Vulnerability landscape
  • Vulnerability assessments
  • Penetration testing


  • Perimeter protection
  • Intrusion detection/prevention
  • Advanced malware detection/prevention
  • Endpoint protection
  • Secure network architectures
  • Internal network visibility
  • SIEM systems


  • SOCs
  • Building a SOC
  • SOC tools and techniques
  • SOC dashboards, metrics, and performance
  • Incident response, handling and management
  • Threat hunting

Who Should Attend

This course is designed for information security professionals and managers who are responsible for detecting, preventing, or responding to cyberattacks.

Coding boot camp professional working on laptop

What You Will Learn

  • Cyber threats
  • Vulnerability assessment and penetration testing
  • Cyber threat detection and prevention
  • Security Information and Event Management (SIEM)
  • SOCs
Cybersecurity professional working on computer

How You Will Benefit

  • Explore current cyber threats.
  • Perform vulnerability scans and penetration tests.
  • Identify issues and gaps with currently available security technologies and emulate attacks to test effectiveness.
  • Explore SIEM technologies and capabilities.
  • Explore SOC implementations, operations, and tools.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani


We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?