|Date||17 - 21 Oct 2022|
|Time||9:00 am - 5:00 pm|
|Venue||Physical, Menara Cyber Axis, Cyberjaya|
Training: RM6,300 (Fees exclude 6% SST)
Not inclusive of Exam Fee @ RM1,200
The CSOC examination is certified by the Global ACE Certification. The examination framework is designed to align with a set of relevant Knowledge, Skills and Attitudes (KSA) that are necessary for a security operation center analyst. Candidates will be tested via a combination of either continual assessment (CA), multiple choice (MC), theory/ underpinning knowledge assessment (UK), practical assessment (PA), assignments (AS) and case studies (CS) as required.
Candidates can take the examination at authorized examination centres in participating member countries. Candidates who have successfully passed the CSOC examination will be eligible to apply as an associate or professional member by fulfilling the membership criteria defined under the Global ACE Certification.
As you are reading this document, more than 100 successful hacking has occurred in the world per minute. With all the news stories about hackers, botnets, and breaches involving personal information, it's easy for the security message to sound over-used and tired. It's easy for people to say, "It won't happen here."
Currently, Security Operation Centre (SOC) Analyst role is being only used in Security Operation Centers (SOC) that are monitoring financial institutions. Instead, we can upscale every IT person in an organization by equipping them with the skillset of a SOC Analyst so that they have the ability to review logs and identify attacks that are happening in their own organization and enable their organization to respond to them effectively.
Module 1: Introduction to Cybersecurity & Latest Attack Trends
Module 2: Security Operations Center (SOC) – Introduction
Module 3 : Understanding Attack DNA
Module 4 : Latest Cybersecurity Defence Technologies
Module 5 : Cybersecurity Incident Response
Identification, Incident Recording, Initial Response, Communicating the Incident, Containment, Formulating a Response Strategy, Incident Classification, Incident Investigation, Data Collection, Forensic Analysis, Evidence Protection, Systems Recovery, Incident Documentation, Incident Damage and Cost Assessment, Review and Update the Response Plan and Policies
Module 6 : Threat Intelligence & Threat Hunting