THM | Security Operations
Introduction to Defensive Security | Security Operations | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Security Operations room.
Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.
Task | 1 | Introduction to Security Operations
Question 1: What does SOC stand for?
Security Operations Center
Question 2: How many hours a day does the SOC monitor the network?
24
Task | 2 | Elements of Security Operations
Question 1: What does NSM stand for?
Network Security Monitoring
Task | 3 | Practical Example of SOC
Question 1: Add the necessary firewall rules to block the ongoing attack. What is the flag that you have received after successfully stopping the attack?
<flag>