Back

SOC Analyst Fundamentals

This course is designed for individuals who are new to cybersecurity and are interested in learning the fundamental skills of a Security Operations Center (SOC) Analyst. A SOC Analyst plays a critical role in an organization's defense against cyber threats, monitoring, detecting, analyzing

Tarek

Lead Trainer

5 hr

Description
Coming soon

Course Curriculum

Introduction

4 lessons

1. Role of SOC in Cybersecurity

2. Importance of proactive SOC

3. SOC team structure and roles

4. Difference between SOC and other functions

Cyber Attacks Introduction

5 lessons

5. CIA Triad

6. Common Cyber Threats

7. Common Attacks

8. Understanding TTPs

9. Understanding IOCs

SOC Lifecycle

4 lessons

10. SOC lifecycle introduction

11. Overview of monitoring process

12. Overview of IR process

13. Key metrics and KPIs

Key SOC Tools and Technologies

3 lessons

14. Introduction to essential SOC tools for monitoring

15. Basic usage of SIEM tools like Splunk or ELK Stack

16. Using network and host-based intrusion detection systems

Understanding Monitoring

6 lessons

17. Security monitoring introduction

18. Security monitoring objectives

19. Log aggregation and analysis

20. Monitoring resources (SIEM, EDR, Firewalls, etc.)

21. Setting up SIEM

22. SIEM queries, filters and dashboards

Detecting Security Events

4 lessons

23. Overview of Indicators of Compromise (IOCs)

24. Analyzing network traffic

25. Recognizing common attack patterns

26. Introduction to threat intelligence feeds

Automation in the SOC

3 lessons

27. Security Orchestration, Automation, and Response (SOAR)

28. How automation helps SOC analysts

29. Examples of common SOC automation tasks

Responding to Common Security Incidents

3 lessons

30. Overview of common incidents

31. Investigating common attack techniques

32. How to analyze and assess the impact of a security incident

Investigating Security Alerts

4 lessons

33. Understanding and prioritizing security alerts in a SOC

34. Using SIEM tools to investigate security incidents

35. Correlating data from multiple sources

36. Distinguishing between false positives and true positives

Best Practices and Building a Strong SOC

5 lessons

37. Best practices for building and operating a SOC

38. Developing playbooks and incident response procedures

39. Ongoing training and skill development for SOC analysts

40. The importance of collaboration

41. Effective communication during incidents

Improving SOC Efficiency

3 lessons

42. How to measure the performance

43. Key metrics for a successful SOC operation

44. Continuous improvement