Information security incident management (Incident detection, triage and incident categories, Incident severity, resolution, Closure, Post-incident), Security Operations Center (SOC) Generations (First-generation, second, third and fourth generation SOC), SOC Maturity models
(Introduction to maturity models, and applying maturity models in SOC), SOC Technologies-1 (Data collection and analysis, syslog protocol), SOC Technologies-2 (Telemetry Data, Security analysis, Data enrichment), Vulnerability Management (Broad introduction), Threat intelligence (Broad introduction), Assessment of SOC capabilities (Business and IT Goals, Assessing capabilities & IT processes), SOC – Business Continuity, Disaster recovery (Importance of BCP and DR processes, and its interface to SOC), Security event generation and collection (Cloud Security, IDPS, Breach Detection), SOC and SIEM – Introduction (Role of SIEM in SOC), SOC and Splunk (Splunk architecture & SOC, Splunk Rules, Splunk log management, Splunk correlation), SOC and Health Care – A Case study (SOC Considerations for a HealthCare situation), SOC and Application security (OWASP, Application security and SOC).