Course description

This course introduces the main cyber threats, attack vectors, and methods used by attackers. It focuses on malware types, phishing tactics, and social engineering techniques.

What will i learn?

  • By the end of this course, learners will recognize common cyber threats, understand attack methodologies, and identify indicators of compromise in SOC environments.

Requirements

  • Laptop, internet access

Frequently asked question

SOC beginners.

Basic IT or cybersecurity knowledge.

Both.

Yes.

Almachius Chrysanty

Free

Lectures

0

Skill level

Beginner

Expiry period

Lifetime

Share this course

Related courses