Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views8 pages

SOC Notes-4

The document outlines the role of a SOC analyst in monitoring and protecting company systems from cyber attacks. It describes various tasks such as writing reports, investigating incidents, and utilizing tools like SIEM and EDR to detect and respond to threats. Additionally, it highlights common attack methods like phishing and malware, and emphasizes the importance of security fundamentals and data privacy.

Uploaded by

lenifob456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

SOC Notes-4

The document outlines the role of a SOC analyst in monitoring and protecting company systems from cyber attacks. It describes various tasks such as writing reports, investigating incidents, and utilizing tools like SIEM and EDR to detect and respond to threats. Additionally, it highlights common attack methods like phishing and malware, and emphasizes the importance of security fundamentals and data privacy.

Uploaded by

lenifob456
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Analyot? DATE:..

SOC
Banuty Opesaton Ceter
ASOC amalyst o Bomeone who orko
m a team that atche over th
ComputerJ, mtwoTko, and data
to Keap hacke out
Conpony
Thuy Monctor bybtems 24/7
looks fo of attaeks

btops that Actiuity


Queidnts
Write uports ahout rtidnt F
what age thoy ptecting
Computus sesws C
machinis
data)
Ntuuogk { Irternt Conneions
Cto
Irtest)
Dato C like customme Info
paasords buiness plams)
what dos SQc
analyst
do
dot dag
watek dasktoardo t aletb
tRt hrw wmal
loqs Cleke
’ check )to a cct
Computers what hate
WoriNO
Cis
Snuestigt alest
it a hacker? Os
DATE:... ..
makng a mibtaks?at

Btop attacks Cbeok bad


uhotat nfctdcempute)
ather ttas
uhat haphemed
Kay ComponantsfCenpto
Cexpaanid Isimphy)
Netuork Bascs
phone umbas
like dsts urto tha
computer
uebait, )
Cecampai door So for
DNS lke phone hoot that
tusrs to
addeBs
Firemall boun
that
beocks had.

Cpunatrg ~yatems
Wundous Records ulat
happened lindoud
ComputesuC
an)
wko loggd un,
hinuc
Bame thing DATE:....

Computers Cstored nlvar/log)


Common Attako

Phushing fate emals to


&teal Passuuodo
Malwage Bocl Sotuse
hat cam
Clita ansomuae)
Lock files
Bruct fore, Tiyng. paasuords
bek
D
Das Oesloadinq Systems

Toals to
SIEM Cliike Splenk orSertinent
al)
Ciamt y altcollets
that

EDR C eSke
Coudsto ke)
Wotehes Compters
Suspieous frogams
Wye 8hask lts you bu Intermt
DATE:.
tr n the
Pabtcado
Metuork
,sis Toctal neebsct to chak
Wabsct I3 langnus
what is Sride tuspona
wkem an attack haps ’
* pteut ct Cwa altto t logs)
to Aee how bacd t s
* ontáun st Cblocks acess, isolat.
neted machins)
Fue t C remove maluar,
Pteh Bstem)
Rupert
wkat o you meeo to lan
1) Babucs how tRe Srtenet
luork
1P adduss. howbrouusers
Feach

hat thu
2) Baaico of lWinalas 4 linus DATE:.
Haw to (Event
Wndos

Base Commando C ike


to
metuork
s) Seeuzity fundamuntals
Keap daat psivate CConyident
Make bwe oata i's iakiy)
cosret

Kup Sytemg wark


CAvailablty
4) Haw, to spat attacko
Phiohlng
CCfake
emails
wgent messagro)
undrcpted boftua
ather attempsto,.(eom
Countust
s)
Simple
btlps
Sruastig atton
"check uho loggod in4 fwm Lheu.
. Lswk at Becess listo (uhtó funniro)
"Kompate to Kmauun good baslinos
6) bott skilla

awment evelthine, lygu do


Csplain
usds
teuh bhall in Sumple
Gpamplo to bring it all

&omemT3AMa,
Rutdia at d3AM,
alelcto tuggs Sndia,
bt
you
email

to
this lenk

TPhihing ttdmgt
lou0 ited Login attempts
heppen U o
that' might be a bute
mrutes
foree
attach
The absaleit muat-hmau soc
DATE:..
chsckeist for begginess
V Ip
IP addesaeo, DNS, porrto
Cbaais netuotered on
V wkat maluiae 4 Phiohinq
look k e
ckat a feieuall, amtielrus,
and SIEM
Basie
Cleast
sesity poiheiptes
ByAtemy
v
patehddý
lookup a
OHow to
rHau to Communicat
cC
ule found maluare
Johis le elated
8dooitie data was
laked )

wky you
look
hBng mamags
Bomdbne
to lua
curous fuilling
Aomaoe uko tollaw DATE:. poocess
"&omeone ko cam Erplain
things clerly
Ae the Reat °Caduamad torle
uaitiy SIEM Tules, foremsio
daugkt bn thu )

You might also like