Sign in Sign up


  • Learning
  • Benchmarking
    • SOC-CMM
  • Community
  • Knowledge Base
    • Thought Leadership
    • Hacked Teardown
    • Malware Families
    • Advanced Persistent Threats
    • SOC Resource Profiles
Sign in Sign up
Back to Course

Security Orchestration, Automation & Response (SOAR)

0% Complete
0/43 Steps
  1. SOAR Playbooks
    27 Topics
    1. Communication with a Known Bad
    2. Denial of Service
    3. Denial of Service
    4. False Positive
    5. Improper Disposal of Confidential Documents
    6. Improper Disposal of Digital Asset
    7. IR Playbook - Suspected Insider Threat
    8. IR Playbook - Suspected System Intrusion
    9. IR Playbook - Third Party Breach
    10. Lost / Stolen Laptop
    11. Lost or Stolen Smart Device
    12. Lost or Stolen Storage Device
    13. Malicious Code
    14. Malware
    15. Malware Detected on Endpoint
    16. Peer-2-Peer File Sharing
    17. Phishing
    18. Port Scan Activity
    19. Privileged Account Creation
    20. Social Engineering
    21. Suspected Data Breach
    22. Suspected Phishing
    23. Suspicious Network Activity
    24. Suspicious System Activity
    25. System Probes & Scanning
    26. Unauthorised Network Activity
    27. Web Application Compromise
  2. SOAR Platform
  3. Configuration Refresh
  4. Vulnerability Management
  5. Issue Management
  6. SOC Program Management
  7. Incident Response
  8. Air-Gapped Implementation
  9. Non-Functional Requirements (NFR)
  10. Business Case for SOAR
  11. Functional Requirements
  12. Technical Building Blocks
  13. Operational Building Blocks
  14. Platform Maintenance
  15. Threat Hunting
  16. SOAR Vendors

Participants3

  • Sadia Shakeel
  • Shakeel Ahmad
  • Secure x Design
Security Orchestration, Automation & Response (SOAR) SOAR Playbooks
In Progress
Lesson 1 of 16
In Progress

SOAR Playbooks

Secure x Design
Lesson Content
0% Complete 0/27 Steps
Communication with a Known Bad
Denial of Service
Denial of Service
False Positive
Improper Disposal of Confidential Documents
Improper Disposal of Digital Asset
IR Playbook - Suspected Insider Threat
IR Playbook - Suspected System Intrusion
IR Playbook - Third Party Breach
Lost / Stolen Laptop
Lost or Stolen Smart Device
Lost or Stolen Storage Device
Malicious Code
Malware
Malware Detected on Endpoint
Peer-2-Peer File Sharing
Phishing
Port Scan Activity
Privileged Account Creation
Social Engineering
1 of 2