What You Need to Know Before
You Start

Starts 20 June 2025 19:59

Ends 20 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

SecOps on GDC for Tier 3 Analysts

Dive into advanced SecOps workflows for Tier 3 analysts, covering incident response, vulnerability management, threat modeling, security engineering, and Splunk management on Google Cloud.
Google via Google Cloud Skills Boost

Google

22 Courses


3 hours 45 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Online Course

Optional upgrade avallable

Overview

This course gives you a deep dive into the workflows of Tier 3 analysts.

Syllabus

  • Course Overview
  • Course 3 Overview
  • Advanced Incident Response
  • Module overview
    Advanced incident response for Tier 3 analysts
    Ad hoc incident response
    Using an incident management plan for ad hoc incident response
    Tools for advanced incident response
    Endpoint Detection and Response (EDR) tools
    Security Information and Event Management (SIEM) tools
    Vulnerability scanners
    Threat intelligence tools
    Intrusion Detection and Prevention Systems (IDPS) tools
    Digital forensic tools
    Advanced incident response tools at Cymbal Federal
    Metrics for evaluating incident response
  • Vulnerability management for Tier 3 analysts
  • Module overview
    Introduction to vulnerability management
    Vulnerability management systems (VMS)
    The vulnerability management lifecycle
    Vulnerability management on GDC
    Techniques for vulnerability management
    Vulnerability assessment
    Vulnerability scanning
    Penetration testing
    Tools for penetration testing
    Best practices for a vulnerability management program
    Vulnerability management reports
    Module summary
    Knowledge check
  • Threat Modeling
  • Module overview
    The modern threat landscape
    Introduction to threat modeling
    The threat modeling process
    Threat modeling frameworks
    Threat modeling frameworks at Cymbal Federal
    Threat intelligence feeds
    Introduction to modeling techniques
    Title needs to be changed later
    STRIDE at Cymbal Federal.mp4
    Process for Attack Simulation and Threat Analysis (PASTA)
    PASTA at Cymbal Federal
    Common Vulnerability Scoring System (CVSS)
    CVSS at Cymbal Federal
    Selecting a threat modeling technique
    SecOps-specific tools for threat modeling
    SecOps-specific tools at Cymbal Federal
    Threat mapping
    Best practices for effective threat
    Module summary
    Knowledge check
  • Security Engineering
  • Module overview.mp4
    Introduction to security engineering
    The Secure by Design approach
    Secure by Design and SecOps
    Security engineers in the SOC
    The security engineering workflow
    Introduction to security controls
    Technical security controls
    Administrative security controls
    Tools for security engineers
    Security engineering best practices
    Module review
    Knowledge check
  • Splunk advanced: Lite management
  • Module overview
    Introduction to Splunk management
    Who is responsible for managing Splunk?
    Configuration files in Splunk
    Administering Splunk with Splunk Web and btool
    Best practices and advanced troubleshooting in Splunk
    Splunk management at Cymbal Federal
    Module review
    Knowledge check
  • Resources
  • Course slides
    Additional resources
  • Your Next Steps
  • Course Badge

Subjects

Information Security (InfoSec)