Become a Professional SOC Analyst

Cyber security SOC Analyst training
Become a Professional SOC Analyst

A Bit About Cyber security SOC Analyst training
A DEFINITION OF SECURITY OPERATIONS CENTER
Security operations centers monitor and analyze activity on networks, servers, endpoints, databases, applications, websites, and other systems, looking for anomalous activity that could be indicative of a security incident or compromise. The SOC is responsible for ensuring that potential security incidents are correctly identified, analyzed, defended, investigated, and reported.
ROLES WITHIN A SECURITY OPERATIONS CENTER
The “framework” of your security operations comes from both the security tools (e.g., software) you use and the Individuals who make up the SOC team.
Members of a SOC team include:
Manager: The leader of the group is able to step into any role while also overseeing the overall security systems and procedures.
Analyst: Analysts compile and analyze at the data, either from a period of time (the previous quarter, for example) or after a breach.
Investigator: Once a breach occurs, the investigator finds out what happened and why, working closely with the responder (often one person performs both “investigator” and “responder” roles).
Responder: There are a number of tasks that come with responding to a security breach. An individual familiar with these requirements is indispensable during a crisis.
Auditor: Current and future legislation comes with compliance mandates. This role keeps up with these requirements and ensures your organization meets them
Note: Depending on the size of an organization, one person may perform multiple roles listed. In some cases, it may come down to one or two people for the entire “team.”
Syllabus
Module -1
Introduction to Cyber Security & its importance in IT
Industry
What is SOC & Importance of SOC?
Role & responsibilities of an SOC analyst
Introduction to Incident Response & Responsibilities of an Incident Response Analyst.
Module -2
What is networking?
CIA Triangle
OSI Model & TCP IP Protocol Suite
Types of Network device and its working
Type of Network Security devices and its working
Module-3
Internet layer & Transport Protocol
UDP & ICMP Protocol
Work group & Domain
Cryptography
Windows password & authentication
Module-4
Logs Analysis
Malware & Types of Malware
Malware Analysis
Module-5
Attacking Phases
Different types of Real time Attacks
Introduction to Web application Security
Vulnerability v/s Threat v/s Risk
Module-6
SIEM Solution
Module-7
SOC investigation tools
Introduction to SIEM USECASES
Types of SIEM USECASES
Module-8
Investigating different real time use cases with mitigation steps.
How to handle Real time Security INCIDENTS.
Module-9
Social Engineering
Phishing & Types of Phishing attack
Investigating real-time Phishing attack
Module-10
MITRE Attack VS Cyber kill chain
Post Completion of 10 Modules, 2 classes will be only dedicated only for Resume building and Mock Interview
