We're taking you from navigating the Windows start menu to triaging Tier 1 SOC Analyst tickets by live stream instructing every piece of content from the pay what you can (PWYC) 400+ hour SOC100 course series over 5 months. Recordings free, and course is minimum $19, suggested $29 with virtual machines provided and lab time.
Full playlist: https://youtube.com/playlist?list=PLarzZ7tJk-lF1l2PpqwPJcVAlYkLl6nLh&si=TvuJWlDVeU0r_s99
Full course info 👉 https://www.leveleffect.com/soc100
Stream calendar 🗓️ https://docs.google.com/spreadsheets/d/12WRVm_52PmFkp6Lr8v9v8M1ONcRytOz8zizYBy10LHI/edit?gid=0#gid=0
Stream Details:
- Class 20
- Course: SOC100-2
- Domain: Governance, Risk, Compliance (GRC) & Cryptography
Website: https://leveleffect.com
Discord: https://discord.gg/level-effect
Twitch: https://www.twitch.tv/leveleffect
Newsletter & Blog: https://news.leveleffect.com/
LinkedIn: https://www.linkedin.com/school/leveleffect
00:00:00 - Welcome back and introductions.
00:01:52 - Group discussion: Sharing holiday highlights and new learnings.
00:06:12 - Teaser for an upcoming event with community involvement.
00:09:29 - Importance of networking in the cybersecurity community.
00:10:49 - Introduction to the agenda: Cryptography and GRC continuation.
00:11:55 - Roadmap: Triage skills for a compromised Windows host starting next week.
00:12:33 - Encouragement for home lab setups and practical learning.
00:14:37 - Overview of the three core GRC policies: Asset management, configuration management, and patch management.
00:17:02 - Explanation of vulnerability management as a logical, procedural approach.
00:18:44 - Identifying vulnerabilities: Scanning tools and frameworks.
00:21:51 - Overview of manual vs. automated vulnerability scanning.
00:26:01 - Definitions of CVE (Common Vulnerabilities and Exposures) and CVSS (Common Vulnerability Scoring System).
00:33:22 - Demonstration of a CVE record and its relationship to CVSS scores.
00:37:06 - Evaluating vulnerabilities when public data isn’t available: Baseline deviation approach.
00:38:46 - Discussion: How to address deviations and determine cyber threats.
00:43:24 - Evaluating suspicious activity: Using geolocation and login patterns.
00:46:27 - Key decision-making criteria in cybersecurity threat analysis.
00:49:21 - Recap: The importance of GRC in vulnerability management and its integration with SOC operations.
00:50:49 - Introduction to vulnerability scanning as a GRC component.
00:55:29 - Breakdown: Network vs. agent-based scanning and their uses.
01:00:10 - Role of tools like Nessus and Nmap in identifying vulnerabilities.
01:05:03 - Reflection on the importance of a comprehensive GRC program to SOC efficiency.
01:08:57 - Transition to first lab: Cyber risk and maturity assessment.
01:11:25 - Introduction to the NIST Cybersecurity Framework Maturity Tool.
01:23:29 - Explanation of the tool’s maturity levels (1-5) and their significance.
01:30:48 - Practical example: Understanding levels 1-3 through real-world scenarios.
01:36:16 - Career insights: Startups vs. established companies in terms of security maturity.
01:38:51 - Balancing experience and stability in career choices.
01:46:34 - Asset management scoring example: Application of the maturity model.
01:52:07 - Overview of SOC analyst role within GRC frameworks.
02:00:23 - Second lab: Hands-on Windows server hardening practices.
02:08:57 - Introduction to cryptography: Basics and historical context.
02:15:23 - Symmetric vs. asymmetric encryption: Key differences, strengths, and weaknesses.
02:23:34 - Applications of encryption: Real-world examples and industry use cases.
02:30:45 - Understanding hashing: Definitions, purposes, and use in data integrity.
02:35:56 - Public Key Infrastructure (PKI): Overview and the role of certificate authorities.
02:40:12 - Best practices for implementing cryptographic techniques in cybersecurity.
02:48:19 - Mid-session recap: Key concepts covered in cryptography basics.
02:55:30 - Common challenges in cryptography implementation and potential solutions.
03:05:44 - Blockchain technology: Its reliance on cryptography and potential applications.
03:15:29 - Q&A session: Deep dive into theoretical concepts and community questions.
03:25:47 - Exploring the future of encryption and emerging cryptographic methods.
03:35:11 - Conclusion of cryptography section part 1
03:45:00 - Final thoughts: Transitioning to triage and practical labs next week.
03:50:00 - Community Q&A: Closing remarks and participant engagement.