Sign in Sign up


  • Learning
  • Benchmarking
    • SOC-CMM
  • Community
  • Knowledge Base
    • Thought Leadership
    • Hacked Teardown
    • Malware Families
    • Advanced Persistent Threats
    • SOC Resource Profiles
Sign in Sign up
Back to Course

Security Orchestration, Automation & Response (SOAR)

0% Complete
0/43 Steps
  1. SOAR Playbooks
    27 Topics
    1. Communication with a Known Bad
    2. Denial of Service
    3. Denial of Service
    4. False Positive
    5. Improper Disposal of Confidential Documents
    6. Improper Disposal of Digital Asset
    7. IR Playbook - Suspected Insider Threat
    8. IR Playbook - Suspected System Intrusion
    9. IR Playbook - Third Party Breach
    10. Lost / Stolen Laptop
    11. Lost or Stolen Smart Device
    12. Lost or Stolen Storage Device
    13. Malicious Code
    14. Malware
    15. Malware Detected on Endpoint
    16. Peer-2-Peer File Sharing
    17. Phishing
    18. Port Scan Activity
    19. Privileged Account Creation
    20. Social Engineering
    21. Suspected Data Breach
    22. Suspected Phishing
    23. Suspicious Network Activity
    24. Suspicious System Activity
    25. System Probes & Scanning
    26. Unauthorised Network Activity
    27. Web Application Compromise
  2. SOAR Platform
  3. Configuration Refresh
  4. Vulnerability Management
  5. Issue Management
  6. SOC Program Management
  7. Incident Response
  8. Air-Gapped Implementation
  9. Non-Functional Requirements (NFR)
  10. Business Case for SOAR
  11. Functional Requirements
  12. Technical Building Blocks
  13. Operational Building Blocks
  14. Platform Maintenance
  15. Threat Hunting
  16. SOAR Vendors

Participants3

  • Sadia Shakeel
  • Shakeel Ahmad
  • Secure x Design
Security Orchestration, Automation & Response (SOAR) SOAR Playbooks Lost or Stolen Storage Device
In Progress
Lesson 1, Topic 12
In Progress
← Previous

Lost or Stolen Storage Device

Secure x Design
Lesson Progress
0% Complete