-
The growing threat situation in the area of cyber security has become increasingly dramatic in recent years. Companies are faced with the situation of protecting themselves from a multitude of dangerous attacks from the internet like never before. The aim of a Security Operations Center (SOC) is to detect and prevent these security threats.
In this course, you will gain insights into the various tasks of a Security Operations Center and learn methods for optimization. Using suitable models, we will familiarize you with the areas of asset management, risk management and security operations. We will also introduce you to helpful tools for threat detection, vulnerability analysis and penetration testing.
-
Course Contents
-
- Risk Management
- Governance, Risk, Compliance
- Regulation
- Risk Analysis
- SOC Operations
- SOC Development and Services
- SOC models
- Analysis and SOPs
- SOC Playbooks
- Automation and Response
- Incident, Investigation and Response
- Endpoints
- Network
- Cloud Services
- Asset Management
- Vulnerabilities
- Remediation
- Security Optimization
- Lifecycle
- Threat Prevention Tools
- SIEM
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). - Risk Management
-
Target Group
-
This overview course is suitable for network and security administrators who want to learn about the function and structure of a Security Operations Center or are planning to set up a SOC.
-
Knowledge Prerequisites
-
Basic knowledge of network and IT security and the terminology used is required.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
The growing threat situation in the area of cyber security has become increasingly dramatic in recent years. Companies are faced with the situation of protecting themselves from a multitude of dangerous attacks from the internet like never before. The aim of a Security Operations Center (SOC) is to detect and prevent these security threats.
In this course, you will gain insights into the various tasks of a Security Operations Center and learn methods for optimization. Using suitable models, we will familiarize you with the areas of asset management, risk management and security operations. We will also introduce you to helpful tools for threat detection, vulnerability analysis and penetration testing.
-
Course Contents
-
- Risk Management
- Governance, Risk, Compliance
- Regulation
- Risk Analysis
- SOC Operations
- SOC Development and Services
- SOC models
- Analysis and SOPs
- SOC Playbooks
- Automation and Response
- Incident, Investigation and Response
- Endpoints
- Network
- Cloud Services
- Asset Management
- Vulnerabilities
- Remediation
- Security Optimization
- Lifecycle
- Threat Prevention Tools
- SIEM
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). - Risk Management
-
Target Group
-
This overview course is suitable for network and security administrators who want to learn about the function and structure of a Security Operations Center or are planning to set up a SOC.
-
Knowledge Prerequisites
-
Basic knowledge of network and IT security and the terminology used is required.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
