Enterprise Security Operations

Current Status

Not Enrolled

Price

Closed

Get Started

SOC Analyst Core: Enterprise Security Track

Formerly 101 Enterprise Security Fundamentals

> View Course Syllabus

 

Support & FAQs

Please use our Support & FAQ page to find more information and reach out to us and join our Discord community for general conversation topics and networking.

 

Important: Virtual Labs

  • Your labs are real virtual machines in the cloud. This means it may take a few minutes until they are started up and available.
  • Whenever you have less than 15 minutes remaining, you will have the option to extend your lab by 1 hour.
  • When a VM shuts down, it will not store your files and data.
  • For the best experience, it’s recommended to use Google Chrome where you will have copy and paste functionality.
Tools Used

Sysmon, PowerShell, CyberChef, ExifTool, Sysinternals Tools, AdFind, PowerView, Incognito, John Ripper, Mimikatz, RClone, Process Hacker, scdbg, Cmder, dnSpy, capa, oletools, Wireshark, PEStudio

Certificate of Completion

Once you finish the course you will receive your Certificate of Completion!

 

 

Average Review Score:
★★★★★
Great Intro to Enterprise Fundamentals
★★★★★

Enjoyed the class. It was a refresher course in some areas and I also learned some newer technologies and tools.

Good knowledges
★★★★★

Good knowledge anyone one embracing CyberSecurity should begin with.
I loved going through all the lessons. Very good stuffs. Good job
Thanks bro.

You must log in and have started this course to submit a review.

Course Content

Introduction
Offline Lab Setup 1 Topic
Lesson Content
0% Complete 0/1 Steps
1) Enterprise Domain Environments
Lesson Content
0% Complete 0/1 Steps
2) Initial Access
3) LOLBins
4) Discovery
5) Credential Attacks
Sessions and Tokens 2 Topics
6) Lateral Movement
Lateral Movement Techniques 2 Topics
7) Windows Endpoint Compromise
Windows Endpoint Compromise Overview 2 Topics
Privilege Escalation Techniques 2 Topics
Data Staging and Exfiltration Techniques 2 Topics
8) Network Telemetry
Network Telemetry and Security 2 Topics
Windows Network Security 2 Topics
9) Malware
Dynamic Malware Analysis 1 Topic
Final
Congratulations and Next Steps
Scroll to Top

Training Waitlist

Join our waitlist and get notified when training becomes available.

Contact Information
Professional Experience
I'm interested in

*By submitting this form, you’re agreeing that we will contact you and to receive our free email newsletter. (You’ll never be spammed and you can unsubscribe at any time.) We do not share your information with third-parties.