Focus2Learn
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooks
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Link
    • OWASP TOP 10 - 2017
    • Splunk UseCases
    • CCNA Course
    • Switch
    • Port Numbers
    • Windows Event IDs
    • Splunk-Oxygen
    • Privilege Escalation Attack
    • Threat Hunting with Splunk
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controls
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
Powered by GitBook
On this page
  • SOC Work Flow
  • Some Useful Tools
  • Reports and Dashboards
  • True - Positive Cases
  • Need of SOC Team
  • SOC Models
  • SOC Team Arc
  • SOC Implementation Phases
  • SIEM Implementation Phases
  • Shift Handover
  • Incident Documentation
  • Metrics in SOC
  • Incident Response Process/Lifecycle
  • Miscellaneous Topics
  • IDS/IPS Q/A
  • Firewall
  • Proxy
  • DHCP
  • ARP
  • DNS
  • OSI Model Example
  • Reference Video

Was this helpful?

  1. Architectures

SOC Analyst Work Culture

PreviousSplunk ESNextAAA

Last updated 4 years ago

Was this helpful?

SOC Work Flow

Some Useful Tools

Reports and Dashboards

Other Reports

True - Positive Cases

Need of SOC Team

SOC Models

SOC Team Arc

SOC Implementation Phases

SIEM Implementation Phases

Shift Handover

Incident Documentation

Metrics in SOC

Incident Response Process/Lifecycle

Miscellaneous Topics

IDS/IPS Q/A

Firewall

Proxy

DHCP

ARP

DNS

OSI Model Example

Reference Video