Introduction to Defensive Security: Security Operations (TryHackMe)

J3bitokJ3bitok
1 min read

In this article, I will write a Security Operations write-up covering an Introduction to Security Operations, Elements of Security Operations, and a Practical Example of SOC.

  1. What does SOC stand for? Security Operations Center

  2. How many hours a day does the SOC monitor the network? 24

  3. What does NSM stand for? Network security monitoring

  4. Add the necessary firewall rules to block the ongoing attack. What is the flag that you have received after successfully stopping the attack? THM{ATTACK_BLOCKED}

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the Lab THM challenges. We can also connect more on LinkedIn or X.

0
Subscribe to my newsletter

Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

J3bitok
J3bitok

Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.