Scenario Based SOC Analyst Interview Questions and Answers | Part 1 | Security Analysts | SOC| Cyber

  Рет қаралды 33,676

CyberPlatter

CyberPlatter

Күн бұрын

Пікірлер
@SoCyber-n5k
@SoCyber-n5k 9 күн бұрын
Love it🎉🎉🎉🎉. I learned a lot how to approach the suspicious email
@sachin-tr4nc
@sachin-tr4nc Жыл бұрын
Finally started, Thanks for starting this session, It will help alot, please include Real time SIEM Scenario questions & answer with use cases, Thanks in Advance & Have a great year ahead 🙂
@a.r.bentley61
@a.r.bentley61 5 ай бұрын
This is good information. it does leave out one critical part in the beginning: whether the employee took action on the email. If the employee simply opened the email, and realized it was spam/phishing/etc, they could simply just report it, mark it as spam/phishing, allow a cyber review of the email, and then delete once in the clear. If they do take action shes giving good steps to take.
@samuelonuoha7540
@samuelonuoha7540 Ай бұрын
i was thinking this in an interview you have to ask what actions where taken
@Rajesh87890
@Rajesh87890 7 күн бұрын
Thanks alot , keep educating us❤
@sachin-tr4nc
@sachin-tr4nc Жыл бұрын
Hi Mam, Can you make videos on below mentioned Topic, as in whole youtube No one has done till now, So i request to please make "How to create use cases & How to Develop use cases with correlation Rules for All SIEM" Thanks in Advance Have a Great year ahead.
@AI-InfoSec
@AI-InfoSec 10 ай бұрын
How to start career as SOC what are the basic tools and knowledge to have while appearing for SOC Analyst
@venkatachandrasrikanthredlam
@venkatachandrasrikanthredlam 4 ай бұрын
Excellent session and very informative
@Aryan-ij3bx
@Aryan-ij3bx 8 ай бұрын
Thanks for your help ❤
@cyberplatter8980
@cyberplatter8980 8 ай бұрын
You're welcome 😊
@maruthikumar9171
@maruthikumar9171 11 ай бұрын
thank you help a lot of information sharing.
@cyberplatter8980
@cyberplatter8980 10 ай бұрын
Glad it was helpful!
@ishwaryanarayan1010
@ishwaryanarayan1010 Жыл бұрын
Thanks . Very informative videos
@cyberplatter8980
@cyberplatter8980 Жыл бұрын
Glad it helped!
@sayoadeyemi5359
@sayoadeyemi5359 6 ай бұрын
Very informative
@karthikmysari6526
@karthikmysari6526 2 ай бұрын
thankyou for this, have an interview tomorrow.
@Yousirarefish
@Yousirarefish 2 ай бұрын
How did it go. ?
@alis518
@alis518 6 ай бұрын
Informative video
@claudiamanta1943
@claudiamanta1943 7 ай бұрын
Thank you. I am not an IT specialist, and all this is fascinating. I have a question. If that employee (who actually paid attention to the IT security training) had not opened that suspicious email, do you need to take all those steps that are hugely disruptive? Can you not contain the suspicious email and analyse it? I think it is more likely that you need to worry about the others in the organisation because the phishing attack might have been deployed at a larger scale and not all employees are as careful as the one who reported it. What would you do? Scan all network for that (and similar) email, isolate it, see on what devices it was open and quarantine those? PS- I love your Eastern European accent (is it Romanian? Hungarian?). Many thanks.
@aejazinamdar6226
@aejazinamdar6226 Жыл бұрын
Hello madam, this video is really awesome. I have a question. If email is opened then it is fine. If user has accessed any attachment or links then it should be necessary to isolate. Pls confirm
@jitendraHati-x8j
@jitendraHati-x8j 11 ай бұрын
These questions are relevant for which level..? L1 , L2 or L3.....
@pavankalyan8489
@pavankalyan8489 9 ай бұрын
All positions mainly L1 and some l2
@ale.9479
@ale.9479 11 ай бұрын
Do you guys offer classes?
@priyadharshini4519
@priyadharshini4519 Жыл бұрын
Ma'am, If the user has not opened/accessed any contents of the email in the first question. Is it still necessary to perform the device isolation, disabling the user from AD.?
@cyberplatter8980
@cyberplatter8980 Жыл бұрын
Hi, Priya, the user is the one who is reporting the email (so they have at least opened the email) and the analyst is sure is a malicious one in this scenario. So, the immediate action is isolation. But if the user has not opened the email at all, you don't have to consider this.
@vijaykala-w8f
@vijaykala-w8f 11 ай бұрын
Opening email and opening attachments... Any different process for these two scenarios??
@abdulrameez1265
@abdulrameez1265 9 ай бұрын
Hi Ma'am, I have googled this. "If you open an email from a scammer without interacting with it, it won’t infect your machine, but the scammer will be able to gather data to use for targeted cyber attacks. For example, the scammer may be able to gather your IP address, the Operating System (OS) that you use and your location"
@Praneethreddy-eg2tk
@Praneethreddy-eg2tk 3 ай бұрын
can I get the introduction for secuirty anaylst
@KrishnaKakade-g6k
@KrishnaKakade-g6k Жыл бұрын
Can we get pdf of these questions?
@saiteja2134
@saiteja2134 4 ай бұрын
Its just like reading the text from chatgpt or google resources
@corneliusdalton4644
@corneliusdalton4644 2 ай бұрын
Very informative
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 6 МЛН
FOREVER BUNNY
00:14
Natan por Aí
Рет қаралды 30 МЛН
Молодой боец приземлил легенду!
01:02
МИНУС БАЛЛ
Рет қаралды 2 МЛН
Mock Interview |  Cyber Security Analyst | What is Incident Response?
15:28
SOC 101: Real-time Incident Response Walkthrough
12:30
Exabeam
Рет қаралды 206 М.
From The Army To 6 Figures In Cybersecurity! (Sr Analyst)
58:16
Tech Is The New Black
Рет қаралды 65 М.
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 6 МЛН