SOC Analyst Lvl 1

This 3-day intensive training equips cybersecurity analysts with a deep understanding SIEM and SOC worflow. Through a hands-on approach, you’ll learn to understand SOC Fundamentals and structure, develop Threat Detection and alert analysis skills, gain expertise in malware traffic analysis, understand Endpoint Monitoring and Forensics and much more.

You’ll work on real-world scenarios to bridge the gap between theory and practice, making this course ideal for analysts, threat hunters, incident responders, and red/blue team members.

By enrolling, you’ll gain one year of access to training materials and our online community for collaboration and additional resources.

Course curriculum

    1. Introduction

    2. Security Operations Center (SOC)

    3. Core Objectives of a SOC

    4. SOC Team Structure Part I

    5. SOC Team Structure Part II

    6. SOC Team Structure Part III

    7. SOC Incident Response Part I

    8. SOC Incident Response Part II

    1. Introduction to Security Onion Part I

    2. Introduction to Security Onion Part II

    3. SOC Workflow Part I

    4. SOC Workflow Part II

    5. Investigating a Security Incident Case Nº 1

    6. Logs and Alerts

    7. NetworkMiner and Kibana

    8. Building Effective Queries Case Nº 2

    9. Hunting for Malware and working with Wireshark

    10. Working with Kibana, Networkminer and Cyberchef

    11. Answering Questions and Final Thoughts

About this course

  • $99.00
  • 19 lessons
  • 6.5 hours of video content

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Security Onion
  • NetworkMiner

These tools will enhance your ability to work effectively with the course materials and practical exercises.