Tag: SOC

Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
attack chain

SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most...
SOC

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoA's is some events that could reveal an active attack before indicators...
Windows Event logs

Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center (SOC)

Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets of business...
SOC Analyst Training

SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools|From Scratch To Advanced

SOC Training is one of the most important concern in order to build a Quality Security Operation Center Team to fight against...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security