Security Operations Center: By: Mohamad Mahmoud
Security Operations Center: By: Mohamad Mahmoud
Security Operations Center: By: Mohamad Mahmoud
SOC
Security Operations Center
Pagina | 1
By: Mohamad Mahmoud
o Decide what the SOC will protect (networks, data, endpoints, cloud
infrastructure).
o Obtain buy-in from senior management with a clear business case for the
SOC.
o Show how it can reduce risks and protect the organization’s assets.
Pagina | 2
By: Mohamad Mahmoud
o Start as a SOC Tier 1 analyst and grow into higher roles like Tier 2, Tier 3, or
SOC manager.
1. Incident Detection:
Learn how to identify suspicious activities using tools like SIEM.
2. Threat Analysis:
Gain skills to analyze threats and determine their impact on the organization.
Pagina | 3
By: Mohamad Mahmoud
3. Incident Response:
Understand how to respond to and mitigate security incidents.
4. Tools Training:
Hands-on training on SIEM platforms, intrusion detection systems (IDS), and
endpoint security tools.
5. Threat Hunting:
Advanced training on proactively identifying potential threats.
1. Continuous Monitoring:
Round-the-clock monitoring of networks and systems.
2. Threat Detection:
Identifying abnormal behaviors or potential attacks.
3. Incident Response:
Addressing and neutralizing threats quickly.
4. Vulnerability Management:
Identifying and mitigating security vulnerabilities.
5. Reporting:
Preparing regular reports on the security status of networks and systems
1. Continuous Monitoring:
Monitoring network traffic around the clock (24/7) to ensure everything remains
secure.
2. Threat Detection:
Identifying suspicious activities, such as intrusion attempts or malware.
Pagina | 4
By: Mohamad Mahmoud
3. Incident Response:
Quickly intervening in the event of an attack or issue to minimize damage.
4. Event Analysis:
Investigating incidents to understand their cause and ensure they do not recur.
5. Reporting:
Providing management with reports on the organization’s security posture and
highlighting risks that may require action.
2. Incident Response:
Rapidly reacting to and mitigating the impact of security incidents.
3. Minimizing Risk:
Reducing the likelihood and consequences of cyberattacks or data breaches.
4. Continuous Monitoring:
Ensuring 24/7 oversight to maintain the security of networks, applications, and data.
2. Use network monitoring tools such as SIEM (Security Information and Event
Management).
Pagina | 5
By: Mohamad Mahmoud
3- TryHackMe (Paid) :
• SOC Level 1 Training: SOC Level 1 Path
• SOC Level 2 Training: SOC Level 2 Path
Arabic language
1- Netreiders.acadmy
Course : eCIR –
Link : https://netriders.academy/courses/incident-response/
Pagina | 6