Cybersecurity Operations Specialist

Develop an improved response to cyber attacks by detecting, containing, eradicating, and reporting a successful cyber breach. With Cyber Security Operations Specialist course, you will be equipped with cyber defence operational skillsets to preemptively address cyber breaches and shorten time to response.

Full Fee$4,000(excluding GST)

Course Duration5 Days

Enrol in this Course Download Brochure

Who is the Course for

Cyber Security Professionals
IT Professionals / Engineers
System / Network Administrators
Information Security Managers and Executives
Project / Risk / Compliance Managers

What You’ll Learn

Cyber Kill-Chain Approach

Learn to appreciate the sequence of events involved in a cyber attack and how you can address cyber attack at various stages

Cyber Incident Response

Discover a management approach for responding to various information security incidents and fast-tracking your response time

Cyber Security Products

Develop skills in addressing cyber threats using monitoring tools and gaining exposure to real-world cyber attack scenarios

Course Outline

Cybersecurity Imperatives

  • Cyber threats, trends, terms, and terminologies
  • CIA, AAA, standards, audit, compliance and regulations
  • Cryptography and applications

Network Technologies and Security

  • Introduction to network systems, types, and devices
  • Secure network protocol (SSL/TLS, SSH)
  • Introduction to network security devices (Firewall, IPS/IDS, SIEM, etc.)

Server System and Logs

  • Types and functions of servers (web, database, mail, AD, etc.)
  • OS servers and their event logs (Windows, Linux, IIS, Apache, Mssql, sendmail, etc.)

Attack Methodology and Types

  • Attack phases
  • Types of vulnerabilities and attacks
  • Web-based attack

Security Operations Centre and Incident Response

  • Different types of information security incidents
  • Information security incident management framework
  • Overview to SOC concepts and operations
  • Threat identification, threat correlation, threat aggregation, threat filtering
  • Incident handling, response management, notification, and reporting

Security Products and Hands-On

  • Checkpoint Firewall, Security Information and Event Management (SIEM)
  • Monitoring tools such as Wireshark, Process Monitor

Cyber-Attack Scenario-based Exercise

  • Exposure to real-world cyber attack scenarios
  • Developing detection and response skills through team-based exercises
Funding available

Find Out More

Want to get the latest updates?

By clicking on the “I Accept” button beside, you acknowledge that you have read and understood the Personal Data Policy, and consent to the collection, use and disclosure of your personal data by ST Engineering. I Accept