SOC Bootcamp Slides
SOC Bootcamp Slides
ZERO TO ONE
By Urvesh Thakkar
WHO AM I ?
Urvesh Thakkar
CHFI | CTIA | ECIH | CND | eTHPv2 | CCSE
2
EC
IN T
GE
3
ST
VA
LI
DA
TE
4
RE
POR
T
5
RE
SP
OPERATION
ON
D
6
DO
CU
M
EN
T
ROLES
TYPES OF SOC MODELS
OPERATION
Consider “SOC” as “Security-as-a-service (SECaas)” that deals with cyber
threat detection and event management. To establish a successful SOC and
provide good quality service a SOC must have the following well managed:
- SSH connections
- File access using FTP
- Access of org resources using VPN
- Network file sharing activity
BASIC ARCH
BASIC ARCH
SECURZY PRO COUPON CODE: CYBERURVESH
BCDE