Get in Touch

Course Outline

Introduction to Blue Team Operations

  • Overview of the Blue Team and its role in cybersecurity.
  • Understanding attack surfaces and threat landscapes.
  • Introduction to security frameworks (MITRE ATT&CK, NIST, CIS).

Security Information and Event Management (SIEM)

  • Introduction to SIEM and log management.
  • Setting up and configuring SIEM tools.
  • Analyzing security logs and detecting anomalies.

Network Traffic Analysis

  • Understanding network traffic and packet analysis.
  • Using Wireshark for packet inspection.
  • Detecting network intrusions and suspicious activity.

Threat Intelligence and Indicators of Compromise (IoCs)

  • Introduction to threat intelligence.
  • Identifying and analyzing IoCs.
  • Threat hunting techniques and best practices.

Incident Detection and Response

  • Incident response lifecycle and frameworks.
  • Analyzing security incidents and containment strategies.
  • Forensic investigation and malware analysis fundamentals.

Security Operations Center (SOC) and Best Practices

  • Understanding SOC structure and workflows.
  • Automating security operations with scripts and playbooks.
  • Blue Team collaboration with Red Team and Purple Team exercises.

Summary and Next Steps

Requirements

  • Basic understanding of cybersecurity concepts.
  • Familiarity with networking fundamentals (TCP/IP, firewalls, IDS/IPS).
  • Experience with Linux and Windows operating systems.

Audience

  • Security analysts.
  • IT administrators.
  • Cybersecurity professionals.
  • Network defenders.
 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories