Security Operations Center in Practice

Security Operations Center in Practice

Course provided by IBM


Summary overview

  • Online anytime
  • 60 hours study time
  • Information technology
  • £399.00
  • Advanced

About this course

Learning outcomes

  1. Get acquainted with the benefits and risks of leveraging cloud technologies
  2. Employ high-end security enterprise solutions
  3. Insight into threat modelling methods and frameworks
  4. Understand Security Operations Center responses to incoming cybersecurity threats
  5. Analyse the roles and archetypes that work in concert to address cybersecurity incidents

How does it work?

  1. This course is divided into three practice levels to progress through at your own pace.

  2. Each level covers more advanced topics and builds up on top of the concepts, practice and skills addressed on the previous practice levels.

Who should take this course

  1. If you already have a lot of experience in cyber security, but desire to dig deeper into advanced concepts such as high-end security enterprise solutions and threat modelling methods and frameworks, this course is right for you.

  2. If youve completed our Getting Started with Threat Intelligence and Hunting and Enterprise Security in Practice foundation and intermediate courses, this is the logical next step for your knowledge building.


  1. EITHERComplete the Enterprise Security in Practice course from the Cyber Security Series.

  2. OR You will need prior knowledge on the following subjects before joining this course:

  3. Motivations behind cyber-attacks, impact on known targeted companies, and the cyber resilience framework.

  4. Market statistics, attack surfaces and vectors in the following industries: Energy and Utilities, Healthcare, Federal government.

  5. Kill chain analysis, statistics and examples for the following cyber-attack approaches: DDoS, Botnets, Injection Attacks, Shellshock, SQL Injection, Watering Hole, Brute Force, Phishing and Ransomware.

  6. First-hand experience using pen testing tools such as: Terminal CLI commands, Telnet, SSH, Nmap, Wireshark, and browser-based security practices.

  7. Real-world use case experience on the sequence of events that occur within a company when exposed to a cyber-attack from an infrastructure perspective to the roles involved in the incident, including the CEO, CISO, DBA, and Network administrators.