What You Need to Know Before
You Start

Starts 5 July 2025 03:58

Ends 5 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

More Technology More People No Process

Join us for an informative session focusing on the balance of technology and people without the constraints of traditional processes. This event delves into the world of security operations, offering a comprehensive look at red team exercises and core concepts in threat intelligence. Attendees will gain valuable insights into metrics, automat.
via YouTube

2777 Courses


48 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join us for an informative session focusing on the balance of technology and people without the constraints of traditional processes. This event delves into the world of security operations, offering a comprehensive look at red team exercises and core concepts in threat intelligence.

Attendees will gain valuable insights into metrics, automation, and the pursuit of quality within the InfoSec domain.

Syllabus

  • Introduction to Course
  • Overview of Security Operations
    Importance of Process in InfoSec
  • Security Operations
  • Fundamentals of Security Operations Centers (SOCs)
    Common Challenges and Solutions
    Implementing Metrics for SOC Efficiency
  • Red Team Exercises
  • Introduction to Red Teaming
    Planning and Execution of Red Team Exercises
    Analyzing and Reporting Red Team Results
  • Core Concepts in Threat Intelligence
  • Understanding Threat Intelligence
    Gathering and Analyzing Threat Data
    Role of Threat Intelligence in Security Operations
  • Metrics in Information Security
  • Defining and Tracking Key Performance Indicators (KPIs)
    Using Metrics to Improve Security Posture
    Reporting and Communicating Metrics Effectively
  • Automation in InfoSec
  • Introduction to Security Automation Tools and Techniques
    Automation in Detection and Response
    Benefits and Challenges of Automation in Security
  • Quality in Information Security
  • Ensuring Quality in Security Programs
    Continuous Improvement and Feedback Loops
    Case Studies on Quality Assurance in Security
  • Conclusion
  • Synthesizing Insights from Technology, People, and Processes
    Future Trends in Security Operations and Threat Intelligence

Subjects

Conference Talks