Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views5 pages

Fundamental Knowledge

The document outlines a comprehensive training program covering fundamental knowledge in networking, operating systems, cryptography, cloud computing, and web scripting, followed by cybersecurity fundamentals including frameworks like MITRE ATT&CK and NIST CSF. It also addresses common malicious behaviors such as social engineering, network attacks, and malware, while detailing security tools like EDR, SIEM, and vulnerability scanning. Finally, it discusses SOC workflows, team responsibilities, and performance metrics essential for effective security operations.

Uploaded by

deepani.vs131804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

Fundamental Knowledge

The document outlines a comprehensive training program covering fundamental knowledge in networking, operating systems, cryptography, cloud computing, and web scripting, followed by cybersecurity fundamentals including frameworks like MITRE ATT&CK and NIST CSF. It also addresses common malicious behaviors such as social engineering, network attacks, and malware, while detailing security tools like EDR, SIEM, and vulnerability scanning. Finally, it discusses SOC workflows, team responsibilities, and performance metrics essential for effective security operations.

Uploaded by

deepani.vs131804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

FUNDAMENTAL KNOWLEDGE(7/06/25-8/06/25)

Network Essentials
Covers essential networking concepts, including TCP/IP and OSI models, common network
devices, key network protocols, and the TCP three-way handshake. Candidates will also
explore workflows of web browsing and email transmission and gain hands-on experience
with HTTP, SSL/TLS, and VPN scenarios.

Operating System Basics


Introduces the Windows and Linux operating systems, covering OS architecture, security
features, authentication mechanisms, file systems, and common processes. Also includes an
introduction to Active Directory and the use of event logs for tracing system activity.

Cryptography Basics
Focuses on fundamental topics, including encryption types and differences between
encoding, encryption, and hashing. Candidates will also learn to recognise common
encodings and get familiar with useful decoding tools.

Cloud and Virtualisation Basics


Covers the essentials of virtualisation and cloud computing, including the differences
between VMs and hosts, cloud vs virtual hosting, and key cloud providers. Candidates will
also learn about cloud service models like SaaS and IaaS with real-world examples.

Web & Scripting Basics


Explores the core web and scripting concepts, including web app architecture, APIs, and
common formats like JSON and XML. Also emphasizes recognizing scripts across various
languages (Python, JavaScript, Bash, PowerShell, PHP) and differentiating scripting from
compiled programs.
Cybersecurity Fundamentals(9/06/25-
10/06/25))
Covers fundamental principles, including the CIA triad, least privilege, and the impact of
human factors in security. Candidates will gain a foundational understanding of modern
cybersecurity trends and major vulnerabilities like Log4Shell and EternalBlue.

MITRE ATT&CK Framework


Introduces the MITRE ATT&CK Framework, a structured knowledge base of adversary tactics,
techniques, and procedures (TTPs). Candidates will learn how to navigate the framework,
understand attack stages, and map real-world attacks on MITRE techniques.

Cyber Kill Chain Framework


Explores the Cyber Kill Chain, its purpose in understanding cyber attacks, and the stages of
an attack lifecycle. Covers the differences between the Cyber Kill Chain and the MITRE
ATT&CK Framework, highlighting their approaches to threat analysis and defence.

NIST Cybersecurity Framework


Covers the NIST Cybersecurity Framework (CSF), including its five stages: Identify, Protect,
Detect, Respond, and Recover. Candidates will learn the high-level purpose of each stage
and map real-world scenarios and attack chains on NIST CSF stages.

Attack Traces and Indicators


Covers Indicators of Compromise (IoC) and Indicators of Attack (IoA). Participants will
explore various types of IoCs (e.g., IP addresses, file hashes, domains), the difference
between IoC and IoA, and the concept of the Pyramid of Pain. Practical examples will
demonstrate how and where to use or define IoCs in real-world scenarios to identify and
respond to security threats effectively
COMMON MALICIOUS BEHAVIOUR

Social Engineering
Covers the attack lifecycle, email vulnerabilities, and detection techniques. Candidates will
analyse phishing tactics such as impersonation, typo-squatting, and sender spoofing while
learning about SPF, DKIM, DMARC, and email analysis for threat identification.

Network Attacks
Explores common network-based attacks, including port scanning, DDoS, MiTM, DNS
poisoning, and ARP spoofing. Candidates will analyse network traffic to identify attack
patterns, data exfiltration techniques, and command-and-control (C2) channels.

Web Exploitation
Focuses on web exploitation, explaining why web applications are prime targets. Covers the
differences between client-side and server-side vulnerabilities, key defensive measures
(input validation, patching, WAF), and common web attacks like XSS, SQL injection, code
injection, and path traversal. Candidates will learn to recognize these threats, understand
their impact, and see real-world exploitation examples.

Endpoint Attacks
Focuses on how attackers gain access to and maintain control over endpoints. Learners will
explore common initial access methods such as RDP/SSH, persistence and privilege
escalation techniques, and credential theft with a focus on Mimikatz usage. The module will
conclude with an understanding of the impact of attacks and the importance of activity
logging for detection using tools like Auditd and Sysmon.

Command & Control


Explores Command and Control, including the different types of shells - forward shells and
reverse shells and when each is used, particularly the advantages of reverse shells in
bypassing firewall restrictions. Explores C2 frameworks like Metasploit and Cobalt Strike,
beaconing techniques, and how they compare to reverse shells, highlighting their
advantages and detection indicators.

Malware & LOLBAS


Introduces malware classification, focusing on understanding the actions performed by
different types of malware. Covers the identification of malware indicators and the
difference between static and dynamic analysis. Provides an introduction to LOLBAS and
explains why threat actors use living-off-the-land techniques for defence evasion.

SECURITY TOOLS OF THE TRADE


Endpoint Detection and Response (EDR)
Explores the functionality of EDR tools, their deployment, and their role in investigations by
providing endpoint telemetry. Compares EDR vs. traditional AV and covers detection
(telemetry, behavioural analysis) and response (remote shell, containment) features.

Network and Web Protection


Covers firewall and WAF deployments, their detection capabilities and limitations, basic
configurations, and firewall log analysis. Candidates will also learn how to create WAF rules
for security enforcement.

Security Information and Event Management (SIEM)


Focuses on SIEM deployments, log parsing, alert management, threat hunting, triage, and
security reporting in SOC environments. Candidates will also learn how raw logs transform
into SIEM alerts and how to use alert properties such as severity and status for triage.

Security Orchestration and Automation (SOAR)


Explores SOAR platforms, their role in automating security responses, and the creation of
playbooks for incident response automation. Focuses on data enrichment and SOAR
integration with threat intelligence platforms.

Threat Intelligence Platforms (TIP)


Covers the use of threat intelligence platforms, feeds, and indicators in SOC workflows.
Explores how TI is used to classify IP addresses, domains, and hashes, introduces YARA for
rule-based detection, and explains TI integration with SIEM and SOAR for data enrichment
and automated threat response.

Vulnerability Scanning
Explains the concept of vulnerability scanning, its purpose, and the importance of regular
scans to identify security weaknesses. Covers the differences between external vs internal
scanning and web vs network scanning, emphasizing their roles in a comprehensive security
strategy.
SOC WORKFLOWS AND ACTIVITIES

SOC Team and Responsibilities


Covers the concept of Blue and Red teams, explaining their roles in security operations.
Introduces different types of security teams and outlines the common security hierarchy
within organizations. Also focuses on SOC Team roles, with a specific emphasis on the
responsibilities of SOC environment.

Common Security Activities


Explains the classification of security activities into proactive and reactive categories.
Discusses common activities, including the purpose of False Positive remediation, detection
engineering, vulnerability scanning, and tabletop exercises. Introduces the concept and
purpose of DFIR and Threat Hunting in enhancing security posture.

Alert Triage and Ticketing


Focuses on the purpose of SOC Workbooks. Explains the difference between ticket, alert,
and detection rule. Walks through the triage workflow and covers alert classification,
including alert severity, statuses, and verdicts.

SOC Metrics and Lookups


Introduces key performance indicators such as MTTA, MTTD, MTTR, and SLA. Candidates will
learn best practices for tracking and improving SOC performance through metrics and
lookups.

Escalation and Communication


Explains escalation basics and common escalation schema/matrix in a SOC environment.
Covers basic remediation steps for handling urgent cases. The session also discusses SOC
communication, focusing on how communication is managed between different teams.

You might also like