<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36488" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/innovator-mcsoc" lastchanged="2025-12-16T14:04:04+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>SOC – Security Operations Center – Hands On Cyber Attack Simulation</title><productcode>MCSOC</productcode><vendorcode>IC</vendorcode><vendorname>Innovator Class</vendorname><fullproductcode>IC-MCSOC</fullproductcode><version>2.1</version><essentials>&lt;p&gt;The Master Class does not require specialized knowledge of specific technologies. Knowledge of IT security principles and information security management should be present.&lt;/p&gt;</essentials><audience>&lt;p&gt;Executives, managers and auditors for IT and information security, employees from the areas of IT and information security.&lt;/p&gt;</audience><contents>&lt;h5&gt;Malware&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Current cyber threat situation and known incidents&lt;/li&gt;&lt;li&gt;Introduction to function and analysis of malware&lt;/li&gt;&lt;li&gt;Practice: Use of tools for malware analysis&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;SIEM, Level 1&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Security Information and Event Management (SIEM) Introduction&lt;/li&gt;&lt;li&gt;SIEM architectures&lt;/li&gt;&lt;li&gt;Introduction Security Incident Management (SIM)&lt;/li&gt;&lt;li&gt;Practice: Use of Splunk and predefined rules for attack detection&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Management of cyber crises, Level 1&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Good and bad examples&lt;/li&gt;&lt;li&gt;Core process for crisis management&lt;/li&gt;&lt;li&gt;Situation center and situation pictures&lt;/li&gt;&lt;li&gt;Practice: Managing a serious cyber incident&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Network forensics&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Recap: TCP/IP protocol family&lt;/li&gt;&lt;li&gt;Secure network architectures&lt;/li&gt;&lt;li&gt;Introduction to protocol analysis tools&lt;/li&gt;&lt;li&gt;Practice: Detecting network-level attacks&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;SIEM, Level 2&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Practice: Creating your own rules based on attacks&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;SOC Management and Reporting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;SOC processes and roles&lt;/li&gt;&lt;li&gt;Practice: SIM process creation&lt;/li&gt;&lt;li&gt;KPI reporting&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Management of cyber crises, Level 2&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to TIBER-DE&lt;/li&gt;&lt;li&gt;Crisis communication&lt;/li&gt;&lt;li&gt;Practice: Creation of own cyber crisis exercises&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Team exercise&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Joint defense of a realistic cyber incident from detection to management&lt;/li&gt;&lt;/ul&gt;</contents><essentials_plain>The Master Class does not require specialized knowledge of specific technologies. Knowledge of IT security principles and information security management should be present.</essentials_plain><audience_plain>Executives, managers and auditors for IT and information security, employees from the areas of IT and information security.</audience_plain><contents_plain>Malware


- Current cyber threat situation and known incidents
- Introduction to function and analysis of malware
- Practice: Use of tools for malware analysis
SIEM, Level 1


- Security Information and Event Management (SIEM) Introduction
- SIEM architectures
- Introduction Security Incident Management (SIM)
- Practice: Use of Splunk and predefined rules for attack detection

Management of cyber crises, Level 1


- Good and bad examples
- Core process for crisis management
- Situation center and situation pictures
- Practice: Managing a serious cyber incident

Network forensics


- Recap: TCP/IP protocol family
- Secure network architectures
- Introduction to protocol analysis tools
- Practice: Detecting network-level attacks
SIEM, Level 2


- Practice: Creating your own rules based on attacks

SOC Management and Reporting


- SOC processes and roles
- Practice: SIM process creation
- KPI reporting

Management of cyber crises, Level 2


- Introduction to TIBER-DE
- Crisis communication
- Practice: Creation of own cyber crisis exercises

Team exercise


- Joint defense of a realistic cyber incident from detection to management</contents_plain><duration unit="d" days="5">5 days</duration><pricelist><price country="DE" currency="EUR">4499.00</price><price country="AT" currency="EUR">4499.00</price><price country="SI" currency="EUR">4499.00</price><price country="CH" currency="CHF">4499.00</price></pricelist><miles/></course>