SECOPS – Implementing Cyber Security Operation

Course Statuse

Registration Open


6 Days, 42 Hours


9:00 AM - 04:00 PM


Weekdays - Weekends

Course Id:


Exam #:


Seat Reservation:

Before 14 Days

Course Overview

SECOPS is the foundation-level course offers the knowledge and skills to understand how a Security Operations Center (SOC) functions. You will understand the basic threat analysis and event correlation, identifying malicious activity, and using a playbook for incident response.  Additionally, gain knowledge on identifying resources for hunting cyber threats, common attack vectors, malicious activity, and […]

Learning Outcome

Upon completion of SECOPS course, you should be able to:

  • Describe a typical Security Operation Center (SOC)
  • Use Network Security Monitoring (NSM) tools and data to conduct basic incident analysis within a threat-centric SOC environment
  • Identify common external resources used by the analysts to hunt for cybersecurity threats
  • Discuss basic events normalization concepts
  • Perform basic events correlation
  • Identify common attack vectors, malicious activities, and patterns of suspicious behaviors
  • Describe the use of a playbook to assist with the incident investigation in a SOC
  • Describe the common metrics used to measure the SOC effectiveness
  • Describe the use of a workflow automation system to optimize SOC operations
  • Describe the components of a typical Incident Response Plan
  • Describe the types and the responsibilities of the Computer Security Incident Response Team (CSIRT)
  • Discuss the use of VERIS to document security incidents


  • Must have completed CCNA Routing and Switching Course

Course Content

  • Describing the Security Operations Center
  • Understanding Network Security Monitoring Tools and Data
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Describing the SOC Playbook and Metrics
  • Understanding the SOC Workflow Management System (WMS) and Automation
  • Describing the Incident Response Plan
  • Describing the Computer Security Incident Response Team

Courses Details

Personal Details

(905) 212-9039

Enquire Now

Courses Form

Courses you maybe interested

Programming with PHP and MYSQL

Programming with PHP and MYSQL course offers advanced knowledge in open source technologies MySQL and PHP to develop console and web applications. Gain hands-on training to use Connectors to access MySQL databases, query the database effectively, present data in...

CCNA Scaling Networks

CCNA Scaling Networks certification training advances your networking career and prepares you for networking analyst and engineering jobs. The course focuses on hands-on training to configure and troubleshoot routers and switches and resolve common issues with OSPF,...