The Rules of Engagement have Changed. Resecure Everything.™

RCSE Course Outline

Stacks Image 598

Module 1: Introduction to Security Controls

Understanding Access Controls
Understanding Data Protection
Setting up Access Control Systems
Access control Matrix
Controlling Network Ports, Protocols, and Services Evaluation Tools for Controlling Restricted Area Access
Access Approvals, Denials and Removals
Trouble shooting

Module 2: Security Operations Center

Need and Risk Assessment
Data Monitoring
Event Management
Incident Response

Module 3: Organisation of SOC team

Building Your SOC
Staffing Options
Career Progression

Module 4: Types of SOC Teams

Global SOC
Cloud SOC
Virtual SOC
Internal Distributed SOC
Internal Centralized SOC
Coordinating SOC

Module 5: Planning and Implementing Defence Mechanisms

Entering Organisation Network
Detecting Malware in a Network
Defense against Malware
Understanding an Attack
Understanding Testing/Reporting Metrics
Intrusion Alarm Response
Identify Rootkit and DLL Injection Activity
Image Forensics Capstone
Setting Mass Notification and Alert Systems
Creating Awareness
Organization Policy Violations
Block or Restrict Unauthorized Access
Privilege Escalation

Module 5: Network Security Management

Understanding Attacker Techniques
System Status Check
Data Recovery
Use of Admin Privileges
Enabling Admin Approvals
Endpoint Security Management
Email and Web Browser Protections
Wireless Device Control
Account Monitoring and Control
VoIP Protection
Data Center Firewall
Third Party
Organisation Remote Security
Account Monitoring and Control
DLP tools
Understanding DDOS attacks
Setting up Honeypots

Module 5: Data Security Management

Evaluate Hardware and Software Controls
Data Monitoring
Database Controls
Identity Access Management
Encryption Policies

Module 5.5: Application Security Management

In-house App Firewall
Hardware and Software Configurations
Dynamic App Testing
Port Restrictions

Module 6: Incident Analysis and Response

Incident Analysis
Tradecraft Analysis
Incident Response Coordination
Countermeasure Implementation
On-site Incident Response
Remote Incident Response

Module 7: Artifact Analysis

Forensic Artifact Handling
Malware and Implant Analysis
Forensic Artifact Analysis

Module 8: SOC Tool Life-cycle

Border Protection Device O&M
SOC Infrastructure O&M
Sensor Tuning and Maintenance
Custom Signature Creation
Tool Engineering and Deployment
Tool Research and Development

Module 9: Audit and Insider Threat

Audit Data Collection and Storage
Audit Content and Management
Monitoring Audit Logs
Insider Threat Support
Insider Threat Case Investigation

Module 10: Scanning and Assessment

Network Mapping
Vulnerability Scanning
Vulnerability and Patch Management
Penetration Tests and Red Team Assessment

Module 11: Importance of Threat Intelligence

Threat-based intelligence
Types of Threat Intelligence
Stages of threat intelligence cycle
People and utilities

Module 12: Threat Detection

Detections and Analysis
Detection Rate
Worldwide Intelligence Coverage
Flexible Deployment Modes
Attacker and Defender’s Perspective
Global Perspective

Module 13: Threat Intelligence

Collect and Manage Intelligence
Collect and organize feeds
Quality assessment
Autonomous responses to threats
API Query
High-concurrency query
Assessing risks

Module 14: Security Information and Event Management

SIEM Architecture
SIEM Features
SIEM Tools

Module 15: SOC Security Architecture

Enterprise Security Architecture
Security Frameworks
Threat Vector Analysis
Data Exfiltration Analysis
Detection Dominant Design
Zero Trust Model of Cybersecurity
Intrusion Kill Chain
Visibility Analysis
Data Visualization
Lateral Movement Analysis
Data Ingress/Egress Mapping
Internal Segmentation

Module 16: Automation and Continuous Security Monitoring

Continuous Security Monitoring (CSM) vs. Continuous Diagnostics
Mitigation (CDM) vs. Information Security Continuous Monitoring (ISCM)
Cyberscope and SCAP
Industry Best Practices:
Continuous Monitoring and the 20 Critical Security Controls
Australian Signals Directorate (ASD) Strategies to Mitigate Targeted Cyber Intrusions
Winning CSM Techniques
Maintaining Situational Awareness
Host, Port, and Service Discovery
Configuring Centralized Windows Event Log Collection
Scripting and Automation
Importance of Automation
Hands-on: Detecting Malicious Registry Run Keys with PowerShell

Share this page
Email This Page

Contact Us