SOC Analyst Terminology for Beginners
A comprehensive introduction to the essential terminology and jargon used in Security Operations Centers, designed for aspiring SOC Analysts.
...
Share
Security Incidents: Core Terminology
Unit 1: Understanding Security Incidents
What is a Security Incident?
True vs. False Positives
False Negatives: The Danger
Incident Severity & Priority
Unit 2: Threats, Vulnerabilities, and Risks
Threat Actors Defined
Attack Vectors Explained
IOCs: Digital Breadcrumbs
Vulnerability vs. Threat
Risk: The Big Picture
Unit 3: SIEM and SOAR
SIEM: Security Central
Essential Security Tools: Jargon and Functionality
Unit 1: Firewalls, IDS, and IPS
Firewall Fundamentals
Firewall Jargon
IDS: The Intrusion Alarm
IPS: Taking Action
Unit 2: Endpoint Detection and Response (EDR)
EDR: Endpoint Security
EDR Key Features
Unit 3: Vulnerability Scanners and Packet Sniffers
Vulnerability Scanners
Interpreting Scan Output
Packet Sniffing Basics
Wireshark: A Closer Look
Common Attack Types: Understanding the Lingo
Unit 1: Phishing, Malware, and Ransomware
What is Phishing?
Malware: A Definition
Ransomware Explained
Unit 2: DDoS and SQL Injection
DDoS: Overwhelming Servers
DDoS Attack Vectors
SQL Injection: The Basics
SQL Injection Examples
Unit 3: Zero-Day Exploits and Supply Chain Attacks
Zero-Day Exploits Defined
Supply Chain Attacks
Real-World Attack Examples
Log Analysis and Incident Response Terminology
Unit 1: Understanding Log Data
What is Syslog?
Windows Event Logs
Key Log Fields
Log Field Significance
Unit 2: Incident Response Lifecycle: Stages 1-3
IR Lifecycle: Prep
IR Lifecycle: Identify
IR Lifecycle: Containment
Unit 3: Incident Response Lifecycle: Stages 4-6
IR Lifecycle: Eradication
IR Lifecycle: Recovery
IR Lifecycle: Lessons