
{"id":25755,"date":"2025-09-07T13:43:41","date_gmt":"2025-09-07T13:43:41","guid":{"rendered":"https:\/\/stage.cloudthat.com\/training\/?post_type=stm-courses&#038;p=25755"},"modified":"2025-09-07T14:12:04","modified_gmt":"2025-09-07T14:12:04","slug":"security-operations-engineer-beta","status":"publish","type":"stm-courses","link":"https:\/\/stage.cloudthat.com\/training\/google-cloud-certification\/security-operations-engineer-beta","title":{"rendered":"Security Operations Engineer (Beta)"},"content":{"rendered":"<p>A Google Cloud Certified Professional Security Operations Engineer detects, monitors, analyzes, investigates, and responds to security threats against workloads, endpoints, and infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Google Cloud Certified Professional Security Operations Engineer detects, monitors, analyzes, investigates, and responds to security threats against workloads, endpoints, and infrastructure.<\/p>\n","protected":false},"author":5091,"featured_media":13779,"template":"","meta":{"footnotes":""},"stm_lms_course_taxonomy":[58],"metadata":{"stm_lms_product_id":["25756"],"_edit_lock":["1757254218:5091"],"_edit_last":["5091"],"permalink_customizer":["google-cloud-certification\/security-operations-engineer-beta"],"permalink_customizer_regenerate_status":["1"],"popular_course":["0"],"_popular_course":["field_64253688bc2e5"],"course_banner_image":[""],"_course_banner_image":["field_63c69a6b81cf1"],"mobile_banner_image":[""],"_mobile_banner_image":["field_63cf93896d207"],"banner_link":[""],"_banner_link":["field_63c69a9681cf2"],"banner_image":[""],"_banner_image":["field_621873548f922"],"banner_description":["Safeguard your organization with a certified Security Operations Engineer \u2014 expertly monitoring, detecting, and responding to threats to ensure robust protection, compliance, and resilience for your critical systems and data."],"_banner_description":["field_612c733ed3564"],"overview_section_heading":["Course Overview"],"_overview_section_heading":["field_64538867ffdd0"],"after_completing_course_heading":["After completing Security Operations Engineer Certification, you will be able to conduct"],"_after_completing_course_heading":["field_645c78ade3f50"],"after_completing_course_0_desciption":["Platform operations"],"_after_completing_course_0_desciption":["field_6103ad2f9f5b2"],"after_completing_course_1_desciption":["Data management"],"_after_completing_course_1_desciption":["field_6103ad2f9f5b2"],"after_completing_course_2_desciption":["Threat hunting"],"_after_completing_course_2_desciption":["field_6103ad2f9f5b2"],"after_completing_course_3_desciption":["Detection engineering\r\n\r\n"],"_after_completing_course_3_desciption":["field_6103ad2f9f5b2"],"after_completing_course_4_desciption":["Incident response\r\n"],"_after_completing_course_4_desciption":["field_6103ad2f9f5b2"],"after_completing_course_5_desciption":["Observability\r\n"],"_after_completing_course_5_desciption":["field_6103ad2f9f5b2"],"after_completing_course":["6"],"_after_completing_course":["field_6103aae828228"],"key_features_heading":["Key Features of Security Operations Engineer Certification"],"_key_features_heading":["field_645388ceffdd1"],"key_features_0_lists":["<strong>1. Practical, Hands-On Security Operations:<\/strong>\r\n\r\n\u2022 Real-world labs, quizzes, and challenge labs to reinforce concepts.\r\n\u2022 Hands-on experience with Security Command Center, Chronicle, and GDC SOC tools.\r\n\u2022 Scenario-based tasks to apply detection and response skills in simulated environments."],"_key_features_0_lists":["field_6103ad559f5b3"],"key_features_1_lists":["<strong>2. Advanced Threat Detection and Response:<\/strong>\r\n\r\n\u2022 Learn to detect, investigate, and respond to security incidents using Google Security Operations.\r\n\u2022 Build custom detection rules with YARA-L and automate threat hunting.\r\n\u2022 Use Google Threat Intelligence to enrich detections and responses."],"_key_features_1_lists":["field_6103ad559f5b3"],"key_features_2_lists":["<strong>3. Comprehensive Platform Mastery:<\/strong>\r\n\r\n\u2022 Deep dive into Security Command Center Enterprise and Chronicle Security Operations.\r\n\u2022 Understand vulnerability management, threat detection, and compliance monitoring.\r\n\u2022 Explore multi-cloud and air-gapped (GDC) security operations."],"_key_features_2_lists":["field_6103ad559f5b3"],"key_features_3_lists":["<strong>4. Modern SOC Practices:<\/strong>\r\n\r\n\u2022 Gain insights into SOC roles, tiered analyst workflows, and incident runbooks.\r\n\u2022 Learn how to triage alerts and manage escalations efficiently.\r\n\u2022 Understand tools and processes for air-gapped and distributed environments."],"_key_features_3_lists":["field_6103ad559f5b3"],"key_features_4_lists":["<strong>5. Automation and Orchestration:<\/strong>\r\n\r\n\u2022 Develop automated playbooks for response using Chronicle.\r\n\u2022 Explore SOAR (Security Orchestration, Automation, and Response) fundamentals.\r\n\u2022 Automate detection, response, and threat hunting workflows."],"_key_features_4_lists":["field_6103ad559f5b3"],"key_features_5_lists":["<strong>6. Integration with Threat Intelligence:<\/strong>\r\n\r\n\u2022 Leverage Google\u2019s Threat Intelligence Platform for advanced detection.\r\n\u2022 Automate IOCs (Indicators of Compromise) and threat graph analysis.\r\n\u2022 Perform digital threat monitoring and attack surface management."],"_key_features_5_lists":["field_6103ad559f5b3"],"key_features_6_lists":["<strong>7. Continuous Compliance Monitoring:<\/strong>\r\n\r\n\u2022 Learn to monitor security posture with Security Health Analytics.\r\n\u2022 Manage and monitor compliance findings in SCC.\r\n\u2022 Implement risk management in multi-cloud environments."],"_key_features_6_lists":["field_6103ad559f5b3"],"key_features_7_lists":["<strong>8. Gen AI for Security Decision-Making:<\/strong>\r\n\r\n\u2022 Use Gemini, Google\u2019s AI collaborator, to analyze and interpret security data.\r\n\u2022 Navigate security incidents and posture with AI assistance.\r\n\u2022 Integrate AI to reduce false positives and improve response efficiency."],"_key_features_7_lists":["field_6103ad559f5b3"],"key_features_8_lists":["<strong>9. Real-World Challenges:<\/strong>\r\n\r\n\u2022 Tackle scenario-based challenge labs to test skills independently.\r\n\u2022 Analyze false positives and improve detection accuracy.\r\n\u2022 Apply knowledge to mitigate threats and vulnerabilities in live scenarios."],"_key_features_8_lists":["field_6103ad559f5b3"],"key_features_9_lists":["<strong>10. Future-Ready Security Operations:<\/strong>\r\n\r\n\u2022 Understand trends in autonomic security operations (ASO).\r\n\u2022 Learn continuous detection and response (CD\/CR) approaches.\r\n\u2022 Prepare for evolving SecOps demands with modern frameworks and tools."],"_key_features_9_lists":["field_6103ad559f5b3"],"key_features":["10"],"_key_features":["field_6103aaff28229"],"who_should_attend_heading":["Who should Attend Security Operations Engineer Certification"],"_who_should_attend_heading":["field_645388faffdd2"],"who_should_attend_0_attend_lists":["Security Analysts"],"_who_should_attend_0_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_1_attend_lists":["SOC Engineers"],"_who_should_attend_1_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_2_attend_lists":["Cloud security professionals"],"_who_should_attend_2_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_3_attend_lists":["Incident Responders"],"_who_should_attend_3_attend_lists":["field_6103adfb3f3e4"],"who_should_attend_4_attend_lists":["IT Administrators"],"_who_should_attend_4_attend_lists":["field_6103adfb3f3e4"],"who_should_attend":["5"],"_who_should_attend":["field_6103ab0d2822a"],"prerequisites_heading":[""],"_prerequisites_heading":["field_64538a51ffdd3"],"prerequisites_text":[""],"_prerequisites_text":["field_612c7498c4b84"],"question_sets_details_heading":[""],"_question_sets_details_heading":["field_65d303841f38d"],"question_sets_details_description":[""],"_question_sets_details_description":["field_65d303841f38e"],"question_sets_details_button_text":[""],"_question_sets_details_button_text":["field_65d303841f38f"],"question_sets_details_question_sets":[""],"_question_sets_details_question_sets":["field_65d303841f390"],"question_sets_details":[""],"_question_sets_details":["field_65d303841f38c"],"category_features_heading":[""],"_category_features_heading":["field_644b8ff35049c"],"category_features_features":[""],"_category_features_features":["field_644b90025049d"],"category_features_cta_text":[""],"_category_features_cta_text":["field_644b90285049f"],"category_features_cta_link":[""],"_category_features_cta_link":["field_644b902d504a0"],"category_features":[""],"_category_features":["field_644b8fe15049b"],"course_features_0_heading":["Why Choose CloudThat as Your Training Partner?"],"_course_features_0_heading":["field_644a0fae0e67e"],"course_features_0_features_list_0_list":["Specialized GCP Focus: CloudThat specializes in cloud technologies, offering focused and specialized training programs. We are Authorized Trainers for the Google Cloud Platform. This specialization ensures in-depth coverage of GCP services, use cases, best practices, and hands-on experience tailored specifically for GCP."],"_course_features_0_features_list_0_list":["field_644a0fc80e680"],"course_features_0_features_list_1_list":["Industry-Recognized Trainers: CloudThat has a strong pool of industry-recognized trainers certified by GCP. These trainers bring real-world experience and practical insights into the training sessions, comprehensively understanding how GCP is applied in different industries and scenarios."],"_course_features_0_features_list_1_list":["field_644a0fc80e680"],"course_features_0_features_list_2_list":["Hands-On Learning Approach: CloudThat emphasizes a hands-on learning approach. Learners can access practical labs, real-world projects, and case studies that simulate actual GCP environments. This approach allows learners to apply theoretical knowledge in practical scenarios, enhancing their understanding and skill set."],"_course_features_0_features_list_2_list":["field_644a0fc80e680"],"course_features_0_features_list_3_list":["Customized Learning Paths: CloudThat understands that learners have different levels of expertise and varied learning objectives. We offer customized learning paths, catering to beginners, intermediate learners, and professionals seeking advanced GCP skills."],"_course_features_0_features_list_3_list":["field_644a0fc80e680"],"course_features_0_features_list_4_list":["Interactive Learning Experience: CloudThat's training programs are designed to be interactive and engaging. We utilize various teaching methodologies like live sessions, group discussions, quizzes, and mentorship to keep learners engaged and motivated throughout the course."],"_course_features_0_features_list_4_list":["field_644a0fc80e680"],"course_features_0_features_list_5_list":["Placement Assistance and Career Support: CloudThat often provides placement assistance and career support services. This includes resume building, interview preparation, and connecting learners with job opportunities through our network of industry partners and companies looking for GCP-certified professionals."],"_course_features_0_features_list_5_list":["field_644a0fc80e680"],"course_features_0_features_list_6_list":["Continuous Learning and Updates: CloudThat ensures that our course content is regularly updated to reflect the latest trends, updates, and best practices within the GCP ecosystem. This commitment to keeping the content current enables learners to stay ahead in their GCP knowledge."],"_course_features_0_features_list_6_list":["field_644a0fc80e680"],"course_features_0_features_list":["7"],"_course_features_0_features_list":["field_644a0fb70e67f"],"course_features_0_background_color":["a:1:{i:0;s:4:\"blue\";}"],"_course_features_0_background_color":["field_644a0fde0e681"],"course_features_1_heading":["Learning objective of Professional Security Operations Engineer Certification"],"_course_features_1_heading":["field_644a0fae0e67e"],"course_features_1_features_list_0_list":["By the end of this course, learners will be equipped to detect, monitor, analyze, investigate, and respond to security threats across workloads, endpoints, and cloud infrastructure using Google Cloud Security tools. "],"_course_features_1_features_list_0_list":["field_644a0fc80e680"],"course_features_1_features_list":["3"],"_course_features_1_features_list":["field_644a0fb70e67f"],"course_features_1_background_color":["a:1:{i:0;s:5:\"white\";}"],"_course_features_1_background_color":["field_644a0fde0e681"],"course_features":["2"],"_course_features":["field_644a0fa10e67d"],"certification_heading":["Certification Details: "],"_certification_heading":["field_64538bffffdd5"],"certification_0_short_description":[""],"_certification_0_short_description":["field_6103ab2f2822c"],"certification_0_list_content":["CloudThat Course Completion Certificate "],"_certification_0_list_content":["field_6103ab4a2822d"],"certification_0_image":["17714"],"_certification_0_image":["field_6103ab5b2822e"],"certification":["1"],"_certification":["field_6103ab1a2822b"],"about_trainer":[""],"_about_trainer":["field_6103ab6c2822f"],"course_fee_heading":[""],"_course_fee_heading":["field_64538c1cffdd6"],"course_fee_list":[""],"_course_fee_list":["field_6103abb728234"],"brochure_pdf":[""],"_brochure_pdf":["field_61232e258f89b"],"trainer":[""],"_trainer":["field_6124990e13784"],"course_outline_heading":["Course Outline "],"_course_outline_heading":["field_64538a8effdd4"],"course_section_0_module_title":["Getting Started with Security Command Center Enterprise"],"_course_section_0_module_title":["field_612f5535940c3"],"course_section_0_module_description":[""],"_course_section_0_module_description":["field_612f564c921af"],"course_section_0_section_0_title":[""],"_course_section_0_section_0_title":["field_612f5233b0278"],"course_section_0_section_0_lesson_list_0_lession_title":["Describe SCC Enterprise\u2019s Core Functionality and Additional Features"],"_course_section_0_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_1_lession_title":["Explore SCC Enterprise Vulnerability Management Features"],"_course_section_0_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list_2_lession_title":["Leverage SCC Enterprise Threat Detection Features"],"_course_section_0_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_0_section_0_lesson_list":["3"],"_course_section_0_section_0_lesson_list":["field_612f530a0ac40"],"course_section_0_section_1_title":["Activities"],"_course_section_0_section_1_title":["field_612f5233b0278"],"course_section_0_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_0_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_0_section_1_lesson_list":["1"],"_course_section_0_section_1_lesson_list":["field_612f530a0ac40"],"course_section_0_section":["2"],"_course_section_0_section":["field_612f51e6b0277"],"course_section_1_module_title":["Security Command Center Fundamentals"],"_course_section_1_module_title":["field_612f5535940c3"],"course_section_1_module_description":[""],"_course_section_1_module_description":["field_612f564c921af"],"course_section_1_section_0_title":[""],"_course_section_1_section_0_title":["field_612f5233b0278"],"course_section_1_section_0_lesson_list_0_lession_title":["Security Command Center Overview "],"_course_section_1_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_1_lession_title":["Assets and Sources "],"_course_section_1_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_2_lession_title":["Detection"],"_course_section_1_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list_3_lession_title":["Compliance Findings"],"_course_section_1_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_1_section_0_lesson_list":["4"],"_course_section_1_section_0_lesson_list":["field_612f530a0ac40"],"course_section_1_section_1_title":["Activities"],"_course_section_1_section_1_title":["field_612f5233b0278"],"course_section_1_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_1_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_1_section_1_lesson_list":["1"],"_course_section_1_section_1_lesson_list":["field_612f530a0ac40"],"course_section_1_section":["2"],"_course_section_1_section":["field_612f51e6b0277"],"course_section_2_module_title":["Google Threat Intelligence"],"_course_section_2_module_title":["field_612f5535940c3"],"course_section_2_module_description":[""],"_course_section_2_module_description":["field_612f564c921af"],"course_section_2_section_0_title":[""],"_course_section_2_section_0_title":["field_612f5233b0278"],"course_section_2_section_0_lesson_list_0_lession_title":["Introduction "],"_course_section_2_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_1_lession_title":["What is Google Threat Intelligence"],"_course_section_2_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_2_lession_title":["Incident Response "],"_course_section_2_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_3_lession_title":["Gemini in Threat Intelligence "],"_course_section_2_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_4_lession_title":["Advanced Threat Hunting"],"_course_section_2_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list_5_lession_title":["Digital Threat Monitoring"],"_course_section_2_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_2_section_0_lesson_list":["6"],"_course_section_2_section_0_lesson_list":["field_612f530a0ac40"],"course_section_2_section_1_title":["Activities"],"_course_section_2_section_1_title":["field_612f5233b0278"],"course_section_2_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_2_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_2_section_1_lesson_list":["1"],"_course_section_2_section_1_lesson_list":["field_612f530a0ac40"],"course_section_2_section":["2"],"_course_section_2_section":["field_612f51e6b0277"],"course_section_3_module_title":["Google Security Operations - Fundamentals"],"_course_section_3_module_title":["field_612f5535940c3"],"course_section_3_module_description":[""],"_course_section_3_module_description":["field_612f564c921af"],"course_section_3_section_0_title":[""],"_course_section_3_section_0_title":["field_612f5233b0278"],"course_section_3_section_0_lesson_list_0_lession_title":["Chronicle Security Operations Platform Overview"],"_course_section_3_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_1_lession_title":["Investigation"],"_course_section_3_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_2_lession_title":["Search and Detection"],"_course_section_3_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_3_lession_title":["Playbooks and Dashboards"],"_course_section_3_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list_4_lession_title":["Managing Responses"],"_course_section_3_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_3_section_0_lesson_list":["5"],"_course_section_3_section_0_lesson_list":["field_612f530a0ac40"],"course_section_3_section_1_title":["Activities"],"_course_section_3_section_1_title":["field_612f5233b0278"],"course_section_3_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_3_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_3_section_1_lesson_list":["1"],"_course_section_3_section_1_lesson_list":["field_612f530a0ac40"],"course_section_3_section":["2"],"_course_section_3_section":["field_612f51e6b0277"],"course_section_4_module_title":["Google Security Operations - Deep Dive"],"_course_section_4_module_title":["field_612f5535940c3"],"course_section_4_module_description":[""],"_course_section_4_module_description":["field_612f564c921af"],"course_section_4_section_0_title":[""],"_course_section_4_section_0_title":["field_612f5233b0278"],"course_section_4_section_0_lesson_list_0_lession_title":["Chronicle Security Operations Architecture"],"_course_section_4_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_1_lession_title":["Ingestion and Enrichment"],"_course_section_4_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_2_lession_title":["Building Detections"],"_course_section_4_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list_3_lession_title":["Marketplace and Settings"],"_course_section_4_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_4_section_0_lesson_list":["4"],"_course_section_4_section_0_lesson_list":["field_612f530a0ac40"],"course_section_4_section_1_title":["Activities"],"_course_section_4_section_1_title":["field_612f5233b0278"],"course_section_4_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_4_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_4_section_1_lesson_list":["1"],"_course_section_4_section_1_lesson_list":["field_612f530a0ac40"],"course_section_4_section":["2"],"_course_section_4_section":["field_612f51e6b0277"],"course_section_5_module_title":["Introduction to SecOps on GDC"],"_course_section_5_module_title":["field_612f5535940c3"],"course_section_5_module_description":[""],"_course_section_5_module_description":["field_612f564c921af"],"course_section_5_section_0_title":[""],"_course_section_5_section_0_title":["field_612f5233b0278"],"course_section_5_section_0_lesson_list_0_lession_title":["GCD Platform Overview \u2022 The infrastructure operator SecOps roles in GDC"],"_course_section_5_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_1_lession_title":["SOC processes in Google Distributed Cloud (GDC) air-gapped"],"_course_section_5_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_2_lession_title":["SOC tools for Google Distributed Cloud (GDC) air-gapped"],"_course_section_5_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list_3_lession_title":["Default logs, metrics, dashboards, and alerts in Splunk SIEM"],"_course_section_5_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_5_section_0_lesson_list":["4"],"_course_section_5_section_0_lesson_list":["field_612f530a0ac40"],"course_section_5_section_1_title":["Activities"],"_course_section_5_section_1_title":["field_612f5233b0278"],"course_section_5_section_1_lesson_list_0_lession_title":["Discussion "],"_course_section_5_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_5_section_1_lesson_list":["1"],"_course_section_5_section_1_lesson_list":["field_612f530a0ac40"],"course_section_5_section":["2"],"_course_section_5_section":["field_612f51e6b0277"],"course_section_6_module_title":["SecOps on GDC for Tier 1 and Tier 2 Analysts"],"_course_section_6_module_title":["field_612f5535940c3"],"course_section_6_module_description":[""],"_course_section_6_module_description":["field_612f564c921af"],"course_section_6_section_0_title":[""],"_course_section_6_section_0_title":["field_612f5233b0278"],"course_section_6_section_0_lesson_list_0_lession_title":["Monitoring and intake for Tier 1 analysts"],"_course_section_6_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_1_lession_title":["Incident response for Tier 2 analysts"],"_course_section_6_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list_2_lession_title":["Runbooks in action: Predefined incident response processes for Tier 1 and Tier 2 analysts"],"_course_section_6_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_6_section_0_lesson_list":["3"],"_course_section_6_section_0_lesson_list":["field_612f530a0ac40"],"course_section_6_section_1_title":["Activities"],"_course_section_6_section_1_title":["field_612f5233b0278"],"course_section_6_section_1_lesson_list_0_lession_title":["Quiz  "],"_course_section_6_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_6_section_1_lesson_list":["1"],"_course_section_6_section_1_lesson_list":["field_612f530a0ac40"],"course_section_6_section":["2"],"_course_section_6_section":["field_612f51e6b0277"],"course_section_7_module_title":["Modern Security Operations"],"_course_section_7_module_title":["field_612f5535940c3"],"course_section_7_module_description":[""],"_course_section_7_module_description":["field_612f564c921af"],"course_section_7_section_0_title":[""],"_course_section_7_section_0_title":["field_612f5233b0278"],"course_section_7_section_0_lesson_list_0_lession_title":["Introduction"],"_course_section_7_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_1_lession_title":["Modernizing Cyber Threat Management "],"_course_section_7_section_0_lesson_list_1_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_2_lession_title":["SecOps 101"],"_course_section_7_section_0_lesson_list_2_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_3_lession_title":["Autonomic Security Operations Overview"],"_course_section_7_section_0_lesson_list_3_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_4_lession_title":["Continuous Detection, Continuous Response "],"_course_section_7_section_0_lesson_list_4_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list_5_lession_title":["Get started with ASO"],"_course_section_7_section_0_lesson_list_5_lession_title":["field_612f533b0ac41"],"course_section_7_section_0_lesson_list":["6"],"_course_section_7_section_0_lesson_list":["field_612f530a0ac40"],"course_section_7_section_1_title":["Activities"],"_course_section_7_section_1_title":["field_612f5233b0278"],"course_section_7_section_1_lesson_list_0_lession_title":["Quiz"],"_course_section_7_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_7_section_1_lesson_list":["1"],"_course_section_7_section_1_lesson_list":["field_612f530a0ac40"],"course_section_7_section":["2"],"_course_section_7_section":["field_612f51e6b0277"],"course_section_8_module_title":["Navigate Security Decisions with Gemini"],"_course_section_8_module_title":["field_612f5535940c3"],"course_section_8_module_description":[""],"_course_section_8_module_description":["field_612f564c921af"],"course_section_8_section_0_title":[""],"_course_section_8_section_0_title":["field_612f5233b0278"],"course_section_8_section_0_lesson_list_0_lession_title":["Lab"],"_course_section_8_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_0_lesson_list":["1"],"_course_section_8_section_0_lesson_list":["field_612f530a0ac40"],"course_section_8_section_1_title":["Objectives"],"_course_section_8_section_1_title":["field_612f5233b0278"],"course_section_8_section_1_lesson_list_0_lession_title":["In this lab, you will learn how to use Gemini, an AI-powered collaborator in Google Cloud, to navigate and understand different areas of security in your environment in Security Command Centre."],"_course_section_8_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_8_section_1_lesson_list":["1"],"_course_section_8_section_1_lesson_list":["field_612f530a0ac40"],"course_section_8_section":["2"],"_course_section_8_section":["field_612f51e6b0277"],"course_section_9_module_title":["Explore false positives through incident detection"],"_course_section_9_module_title":["field_612f5535940c3"],"course_section_9_module_description":[""],"_course_section_9_module_description":["field_612f564c921af"],"course_section_9_section_0_title":[""],"_course_section_9_section_0_title":["field_612f5233b0278"],"course_section_9_section_0_lesson_list_0_lession_title":["Lab"],"_course_section_9_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_9_section_0_lesson_list":["1"],"_course_section_9_section_0_lesson_list":["field_612f530a0ac40"],"course_section_9_section_1_title":["Objectives"],"_course_section_9_section_1_title":["field_612f5233b0278"],"course_section_9_section_1_lesson_list_0_lession_title":["Analyse a false positive threat using the Security Command Centre (SCC) and take action to address it."],"_course_section_9_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_9_section_1_lesson_list":["1"],"_course_section_9_section_1_lesson_list":["field_612f530a0ac40"],"course_section_9_section":["2"],"_course_section_9_section":["field_612f51e6b0277"],"course_section_10_module_title":["Mitigate Threats and Vulnerabilities with Security Command Centre: Challenge Lab"],"_course_section_10_module_title":["field_612f5535940c3"],"course_section_10_module_description":[""],"_course_section_10_module_description":["field_612f564c921af"],"course_section_10_section_0_title":[""],"_course_section_10_section_0_title":["field_612f5233b0278"],"course_section_10_section_0_lesson_list_0_lession_title":["Challenge Lab"],"_course_section_10_section_0_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_10_section_0_lesson_list":["1"],"_course_section_10_section_0_lesson_list":["field_612f530a0ac40"],"course_section_10_section_1_title":["Objectives"],"_course_section_10_section_1_title":["field_612f5233b0278"],"course_section_10_section_1_lesson_list_0_lession_title":["In a challenge lab you\u2019re given a scenario and a set of tasks. Instead of following step-by-step instructions, you will use the skills learned from the labs in the course to figure out how to complete the tasks on your own"],"_course_section_10_section_1_lesson_list_0_lession_title":["field_612f533b0ac41"],"course_section_10_section_1_lesson_list":["1"],"_course_section_10_section_1_lesson_list":["field_612f530a0ac40"],"course_section_10_section":["2"],"_course_section_10_section":["field_612f51e6b0277"],"course_section":["11"],"_course_section":["field_612f4f27b0276"],"note_section":[""],"_note_section":["field_616d3ed46bbd2"],"popular_sort":[""],"_popular_sort":["field_6172496402af3"],"related_courses":[""],"_related_courses":["field_61c453ca6b2dd"],"reviews_heading":[""],"_reviews_heading":["field_64538c39ffdd7"],"review_rating":[""],"_review_rating":["field_62a813a92bee6"],"total_review_count":[""],"_total_review_count":["field_62b002d8d2de5"],"average_review_count":[""],"_average_review_count":["field_62b00367d2de6"],"faq_heading":["FAQs:"],"_faq_heading":["field_64538c59ffdd8"],"educational_schema":[""],"_educational_schema":["field_652fbbf6f589a"],"curriculum":[""],"featured":[""],"views":["192"],"level":["beginner"],"current_students":["0"],"duration_info":["5 Days"],"video_duration":[""],"status":[""],"status_dates":[""],"not_single_sale":[""],"price":["29900"],"sale_price":[""],"sale_price_dates":[""],"enterprise_price":[""],"not_membership":[""],"affiliate_course":[""],"affiliate_course_text":[""],"affiliate_course_link":[""],"expiration_course":[""],"end_time":[""],"drip_content":[""],"prerequisites":[""],"prerequisite_passing_level":[""],"announcement":[""],"faq":["[{\"question\":\"What is the main goal of this course?\",\"answer\":\"The main goal is to equip learners with the skills to detect, monitor, investigate, and respond to security threats using Google Cloud\u2019s Security Operations tools and best practices.\"},{\"question\":\"Who should take this course?\",\"answer\":\"This course is ideal for security analysts, SOC engineers, cloud security professionals, incident responders, and IT administrators working with Google Cloud environments\"},{\"question\":\"Do I need prior experience to enroll?\",\"answer\":\"Basic knowledge of cloud computing and fundamental security concepts is recommended, but the course starts at an introductory level and builds practical skills step by step.\"},{\"question\":\"What Google Cloud services will I learn about?\",\"answer\":\"You\u2019ll get hands-on experience with Security Command Center Enterprise, Chronicle Security Operations, Google Threat Intelligence, and Google Distributed Cloud (GDC) SOC tools.\"},{\"question\":\"Does this course include practical labs?\",\"answer\":\"Yes. The course includes practical labs, quizzes, discussion activities, and challenge labs to apply what you learn in real-world scenarios.\"},{\"question\":\"Will this course help me prepare for certification?\",\"answer\":\"Yes. This course helps you build the skills required for the Google Cloud Certified Professional Security Operations Engineer exam.\"},{\"question\":\"How is this course structured?\",\"answer\":\"The course is divided into 11 modules covering fundamentals, deep dives into tools, threat intelligence, SOC operations, automation, AI-powered security decision-making, and hands-on labs.\"},{\"question\":\"What skills will I gain by the end of the course?\",\"answer\":\"You\u2019ll learn how to detect and respond to threats, build detection rules, manage compliance, automate security operations, use threat intelligence, and apply AI tools like Gemini for decision support.\"},{\"question\":\"Is there any assessment or exam during the course?\",\"answer\":\"Each module includes quizzes and practical activities to test your understanding. Challenge labs simulate real-life incidents to assess your readiness.\"},{\"question\":\"What makes this course unique?\",\"answer\":\"This course combines Google Cloud\u2019s advanced security tools with modern SOC practices, AI integration, and hands-on experience - giving you both technical and practical skills that are immediately applicable in enterprise environments.\"}]"],"course_files_pack":[""],"course_certificate":[""],"type":[""],"video_type":[""],"presto_player_idx":[""],"lesson_video":[""],"lesson_video_poster":[""],"lesson_video_width":[""],"lesson_shortcode":[""],"lesson_embed_ctx":[""],"lesson_youtube_url":[""],"lesson_stream_url":[""],"lesson_vimeo_url":[""],"lesson_ext_link_url":[""],"duration":[""],"preview":[""],"lesson_excerpt":[""],"lesson_files_pack":[""],"questions":[""],"quiz_style":[""],"duration_measure":[""],"correct_answer":[""],"passing_grade":[""],"re_take_cut":[""],"random_questions":[""],"answers":[""],"question_explanation":[""],"question_view_type":[""],"review_course":[""],"review_user":[""],"review_mark":[""],"order":[""],"absolute":[""],"sticky":[""],"sticky_threshold":[""],"sticky_threshold_color":[""],"stm_agenda":[""],"stm_host":[""],"stm_select_approved_denied":[""],"stm_multiselect_approved":[""],"stm_multiselect_denied":[""],"stm_date":[""],"stm_time":[""],"stm_timezone":[""],"stm_duration":[""],"stm_password":[""],"stm_waiting_room":[""],"stm_join_before_host":[""],"stm_host_join_start":[""],"stm_start_after_participants":[""],"stm_mute_participants":[""],"stm_enforce_login":[""],"stm_alternative_hosts":[""],"author_id":[""],"emails":[""],"wpdocs-meta-bdt":["29898"],"wpdocs-meta-gbp":["1399"],"wpdocs-meta-rand":["7850"],"wpdocs-meta-aed":["4739"],"wpdocs-meta-usd":["1599"],"_yoast_wpseo_primary_stm_lms_course_taxonomy":["58"],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"offline_price":[""],"offline-bdt":[""],"offline-gbp":[""],"offline-rand":[""],"offline-aed":[""],"offline-usd":[""],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_title":["Security Operations Engineer (Beta)"],"_yoast_wpseo_metadesc":["Learn SOC operations, incident response, SIEM, and cloud security with the Security Operations Engineer (Beta) course."],"_thumbnail_id":["13779"],"course_features_1_features_list_1_list":["They will gain practical experience with Security Command Center Enterprise, Chronicle Security Operations, Google Threat Intelligence, and Google Distributed Cloud (GDC) SOC tools."],"_course_features_1_features_list_1_list":["field_644a0fc80e680"],"course_features_1_features_list_2_list":["Participants will develop skills to build detection rules, prioritize and ingest logs, automate responses, manage compliance, and leverage AI-powered capabilities with Gemini to navigate complex security decisions. "],"_course_features_1_features_list_2_list":["field_644a0fc80e680"]},"acf":[],"_links":{"self":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25755"}],"collection":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses"}],"about":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/types\/stm-courses"}],"author":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/users\/5091"}],"version-history":[{"count":6,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25755\/revisions"}],"predecessor-version":[{"id":25906,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm-courses\/25755\/revisions\/25906"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media\/13779"}],"wp:attachment":[{"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/media?parent=25755"}],"wp:term":[{"taxonomy":"stm_lms_course_taxonomy","embeddable":true,"href":"https:\/\/stage.cloudthat.com\/training\/wp-json\/wp\/v2\/stm_lms_course_taxonomy?post=25755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}