In this course you begin the security event triage path, entering the world of modern security operations and learning the technologies and skills required by security analysts to be as advanced as the threats they face.
Keeping up with advanced cyber threats and sifting through the insurmountable number of alerts available to security analysts is not sustainable without leveling up your security analysis skills to keep pace with modern security operations. In this course, Security Event Triage: Operationalizing Security Analysis, you will gain foundational knowledge of modern cybersecurity continuous monitoring techniques and processes. First, you will learn how the security analyst fits into the overall cybersecurity posture of an organization. Next, you will discover the technologies and methodologies covered in the security event triage path. Finally, you will map the knowledge, skills, and abilities taught in each of the security event triage courses to the MITRE ATT&CK techniques that comprise the chain of compromise used by the simulated threat actors. When you’re finished with this course, you will have the skills and knowledge of security analysis needed to identify and interrogate all manner of cyber threats.
Course Overview Hi everyone, my name is Aaron Rosenmund, and welcome to my course, Operationalizing Security Analysis, the beginning of the Security Event Triage path. I'm a full-time author here at Pluralsight with a focus on research and content creation for instant response and security operations. And I want to welcome you to the cat and mouse game of security operations where your job is to detect and defend all the things, all the time. Whether you are defending a global robotics conglomerate like the security analyst you follow in this course, protecting critical industries like finance power or defense or guarding the privacy and ability to operate of the countless technology enabled enterprises across the world. The threats and skills learned in the Security Event Triage path are real and immediately applicable. In this course, we're going to introduce and develop your understanding of enterprise security operations, the data analysis tools of the trade, and how modern security operation keeps up with advanced threats. By the end of this course, you'll understand the technology and processes used to match advanced adversaries at every turn and how those operations fit into the everyday practices of the information security component of an organization. Before beginning this course, you should be familiar with the security fundamentals, and from here, you should feel comfortable diving into the rest of the Security Event Triage path with courses on detecting malicious traffic with signature and session analysis, monitoring assets and topology, and leveraging existing security device alerts. I hope you'll join me on this journey to learn security analysis with the Security Event Triage, Operationalizing Security Analysis course at Pluralsight.