ServiceNow Security Operations (SecOps) Fundamentals Training

Course Outline

Using Security Operations, security analysts and vulnerability managers can seamlessly automate their security tools and communicate with IT by working in a united platform. This course is designed for Security Operations administrators, ServiceNow administrators, and consultants who need to configure and administer ServiceNow Security Operations applications. Learners attending the course can expect to learn how to leverage Security Operations applications to improve their organization’s security maturity by identifying, prioritizing, and remediating vulnerabilities, critical security incidents, and misconfigured assets.

ServiceNow Security Operations (SecOps) Fundamentals Training Benefits

  • In this course, you will:

    • Demonstrate Baseline Security Incident Response Lifecycle
    • Identify Security Incident Response Workflow-Based Responses
    • Partner with Now Assist AI to summarize security incidents
    • Partner with Now Assist AI to generate closure notes
    • Configure Vulnerability Assessment and Management Response Tools
    • Explore the Vulnerability Response Application
    • Create Watch Topics and Explore Remediation Efforts
    • Explore the Threat Intelligence Application
    • Employ Threat Sources and Explore Attack Modes and Methods
    • Define Observables, Indicators of Compromise (IoC), IoC Look Ups
    • View and Analyze Security Operations Data
  • Prerequisites

    • ServiceNow Administration Fundamentals (SNAF) Training
    • Get Started with Now Create (On Demand)
    • ServiceNow Platform Implementation Training

ServiceNow SIR Implementation Course Outline

Learning Objectives

Module 1: Security Operations Overview 

Objectives 

      • Learn the Current State of Security; Explore Security Maturity Levels.
      • Discover the ServiceNow Security Operations application.
      • Walk through a typical SecOps security Incident (Day in the Life).
      • Explore Essential platform and security administration concepts.
      • Learn the current state of security and explore Security Operations maturity.
      • Explore Essential Platform and Security Administration Concepts.

Labs  

      • Lab 1.3 Security Operations User Administration

Module 2: Security Operations Common Functionality

Objectives 

      • Investigate Security Operations Common Functionality.

Labs 

      • Lab 2.3.1 Email Parser
      • Lab 2.3.2 Security Operations Common Functionality

Module 3: Vulnerability Response

Objectives 

      • Overview of Vulnerability Response
      • Explore Infrastructure Vulnerability Response
      • Explore Application Vulnerability Response
      • Explore Container Vulnerability Response
      • Explore Vulnerability Exclusion Rules
      • Explore Configuration Compliance
      • Explore Security Posture Control (SPC)
      • Explore Cybersecurity Executive Dashboard

Labs 

      • Lab 3.1 Explore the Vulnerability Response Application
      • Lab 3.1.2 Explore Vulnerability Entries
      • Lab 3.2.1 Explore Vulnerable Items and Solutions
      • Lab 3.2.2 Watch Topics and Remediation Efforts
      • Lab 3.2.3 Vulnerability Remediation 

Module 4: Security Incident Response

Objectives 

      • Overview of the Security Incident Response Application
      • View Security Incident Response Components and Configuration
      • Explore Security Incident Response Workflow-Based Responses
      • Explore Major Security Incident Management (MSIM) Workspace
      • Now Assist AI for Security Operations

Labs 

      • Lab 4.2 Creating Security Incidents
      • Lab 4.3.1 Security Incident Response Configuration
      • Lab 4.4 Now Assist AI for Security Operations

Module 5: Threat Intelligence 

Objectives 

      • Define ServiceNow Threat Intelligence
      • Set Up Threat Sources
      • Explore Attack Modes and Methods
      • Understand Observables, IoCs and IoC Look Ups
      • Explore Threat Intelligence Security Center

Labs 

      • Lab 5.3.1 Review and Update an Existing Attack Mode/Method
      • Lab 5.3.2 Working with Indicators of Compromise
      • Lab 5.3.3 Automated Lookups in Security Incidents 
Course Dates - North America
Course Dates - Europe
Attendance Method
Additional Details (optional)