SANS MGT517: Managing Security Operations: Detection, Response, and Intelligence 2018

مرکز عملیات امنیت سایبری (security operations center )، مکانی جهت پایش و کنترل 24 ساعته امنیت ورود و خروج اطلاعات در شبکه بعنوان بخش مرکزی جهت دریافت گزارشات امنیتی، تحلیل وقایع، اتخاذ تدابیر و اعمال سیاست‌های امنیتی بر روی بخش‌های مختلف شبکه صنعتی و سایبری می‌باشد. دوره طراحی و راهبری مرکز عملیات امنیت SANS MGT517: Managing Security Operations: Detection, Response, and Intelligence به شما کمک می کند تا با تمامی تجهیزات که در لایه‌های متفاوت کار می‌کنند تا وقایع رخ داده شده توسط اطلاعات انتقالی را برای مرکز عملیات امنیت ارسال ، دسته بندی، جمع آوری و آنالیز می نمایند، آشنا شوید.

لینک دانلود دوره SANS MGT517: Managing Security Operations: Detection, Response, and Intelligence 2018

 

دانلود – حجم : 148 مگابایت

رمز فایل: technet24.ir

Format: PDF
Date: 2018
Security Operations is responsible for protecting an organization’s information sy7stems through proactive design and configuration, ongoing monitoring of system state, detection of unintended actions or undesirable state, and minimizing of damage from unwanted effects. A security operations program (usually embodied in the form of a Security Operations Center or SOC) succeeds when it intervenes in an adversary’s efforts to impact the availability, confidentiality, and integrity of the organization’s information assets. Too often, SOCs fail to interrupt adversary efforts because they are not able to effectively align SOC functions with one another, the IT operations, and the organization’s business needs.

SANS MGT517: Managing Security Operations: Detection, Response, and Intelligence 2018

The Security Operations Summit brings together prominent practitioners from leading organizations for two days of in-depth talks and panel discussions around building, operating, and maturing a successful security operations program. Speakers will share innovative approaches and techniques they’ve used to enhance the key operational functions of a SOC: network monitoring, incident response, threat intelligence, forensics, self-assessment, and the command center.

Explore new ideas, tools, and techniques related to the following topics:

  • Active defense
  • Metrics to measure success of your SOC
  • Threat Hunting in Security Operations
  • SOC Automation and Orchestration
  • Enhancing the impact of current security tools and platforms
  • Integrated security defenses
  • Enterprise network and host monitoring
  • Leveraging threat intelligence
  • Incident response team operations and management
100%
Awesome
  • Design

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.