cso

Security Operations Center Analyst

  • 100% Online,Self-directed
  • High demand for certified professionals
  • 4 Quizzes

Instructor: Dr. Fred Cohen

https: //academy.izen.ai

Email: info@izen.ai

NASSCOM FutureSkills Ecosystem Partner

Certificate from Webster University

The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and more. Cybersecurity has become increasingly critical in the cyber-age.

Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations. Attacks are getting more sophisticated, more frequent, and reaching more people around the world. That makes it important for you to become aware of the effects of cybersecurity issues.

HIGH DEMAND
Organizations are losing millions of dollars to network attacks. They are fighting back by hiring Cybersecurity experts.

HUGE SUPPLY GAP
Demand for Cybersecurity experts far exceeds supply. That means less competition and more salary for experts.

BRIGHT FUTURE
3.5 million unfilled Cybersecurity jobs projected by 2022 and Cybersecurity jobs are not going away anytime soon.

  • Kickstart or re-kindle your career: This is an “Outcome-based training” with a focus on employability, designed to prepare you for employment opportunities to work at a Security Operations Centre (SOC/NOC)
  • Learn from the best in the world expert instructor, who earned thetitle “Father of the Computer Virus” and devised defenses used in more than 80% of computers worldwide
  • Get practical insights from an (ISC)² Fellow, with over 40 years of experience in the cybersecurity industry and academia
  • Real-life use-cases and case studies to give you practical insights
  • Receive a Certificate upon successfully completing the course
  • Learn by doing: Access iZen’s cyberlabs for lab exercises to reinforce the understanding of concepts. Get hands-on experience
  • If you are a student seeking employment to kickstart your career, this is a great opportunity for you to build a rewarding, future-proof, and meaningful career
  • If you are already employed but are trying to rekindle your career in the exciting world of cybersecurity, this program is perfect for you
PREREQUISITES:
  • Basic knowledge of computers and networking. No programming skills needed
  • Physical and logical layers
  • Protocols and IP, Sniffing, TCP, UDP, DNS
  • How does the traffic flow?
  • Governance, Flow of traffic and SMTP
  • Live Lab-exercises
  • Components, and attack mechanisms
  • Attacker objectives, capabilities
  • Attacker methods and mechanisms
  • Defender’s viewpoints and objectives
  • Attack methodologies
  • Starting position and attack progression
  • Passive and active attack tools
  • Design basis threat
  • Live Lab-exercises
  • The magnitude of the problemy
  • Attacks on Vs. through networks
  • Detecting known attack sequences
  • Live Lab-exercises
  • A general approach to detection
  • Loss of accountability
  • Detection and response in a NOC
  • Live Lab-exercises
PROGRAM FACULTY

Dr. Fred Cohen has over 40 years of experience building companies and supporting risk management and strategic decision making for enterprises of all sizes. He is globally recognized as an innovative expert in information protection and cybersecurity. He is one of the only 20 Cybersecurity experts in the world, recognized as a fellow of (ISC)² at “Cybersecurity and IT Security Certifications and Training”. Dr. Cohen works closely with global experts to help bring knowledge of all things Cyber to program attendees from around the world.

LinkedIn profile: https://www.linkedin.com/in/dr-fred-cohen/

The more detailed profile can be found at http://fc0.co/

Dr. Cohen has a long history of being ahead of the curve:

  • Won several international awards for his work in Cybersecurity
  • Led the team that defined the information assurance problem as it relates to critical infrastructure protection
  • Did seminal research in the use of deception for information protection
  • His "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global use
  • A leader in advancing the science of digital forensic evidence examination
  • Top-flight information protection consultant and industry analyst for many years
  • Authored more than 200 invited, refereed, and other scientific and management research articles
  • Wrote monthly articles on cyber since 1995 and wrote several books on information protection
  • His "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues worldwide
  • Leading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and booklets
  • His "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk shows
  • The research community has widely used his series of "Infosec Baseline" studies as stepping off points for further research
  • His "50 Ways" series is very popular among practitioners looking for issues to be addressed
  • His "World War 3 .Information Warfare Basics" is highly regarded among the thinkers in this arena
  • Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
  • Taught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil matters
  • Was named the "most famous hacker" of all time by ABC News in 2009
  • Online using desktop, laptop or mobile devices
  • Learn at your own convenient time, and pace
  • Video lectures delivered from a cloud LMS platform
  • Quizzes are given remotely
  • Hands-on projects, and industry case studies for the reinforcement of the learning
  • A total of around 60-75 hours depending on your background/experience
  • The course can be completed in 8-weeks to 12-weeks depending on how much time you can dedicate per week for this course

REQUEST DEMO