Know your gear
Participants learn about intelligence-driven SOC processes, standard operating procedures (SOPS), and monitoring tools. They learn to recognize the formats associated with the course with the various sources of information available in a network environment. The course follows the end-to-end workflow of a Tier 1 Security Analyst, including all steps that are needed to handle each type of identified security incident.