top of page

Cyber security SOC Analyst training

Become a Professional SOC Analyst

Home: Welcome
Image by FLY:D

A Bit About Cyber security SOC Analyst training

A DEFINITION OF SECURITY OPERATIONS CENTER 


Security operations centers monitor and analyze activity on networks, servers, endpoints, databases, applications, websites, and other systems, looking for anomalous activity that could be indicative of a security incident or compromise. The SOC is responsible for ensuring that potential security incidents are correctly identified, analyzed, defended, investigated, and reported.



ROLES WITHIN A SECURITY OPERATIONS CENTER


The “framework” of your security operations comes from both the security tools (e.g., software) you use and the Individuals who make up the SOC team. 


         Members of a SOC team include:

  • Manager: The leader of the group is able to step into any role while also overseeing the overall security systems and procedures.

  • Analyst: Analysts compile and analyze at the data, either from a period of time (the previous quarter, for example) or after a breach.

  • Investigator: Once a breach occurs, the investigator finds out what happened and why, working closely with the responder (often one person performs both “investigator” and “responder” roles).

  • Responder: There are a number of tasks that come with responding to a security breach. An individual familiar with these requirements is indispensable during a crisis.

  • Auditor: Current and future legislation comes with compliance mandates. This role keeps up with these requirements and ensures your organization meets them

Note: Depending on the size of an organization, one person may perform multiple roles listed. In some cases, it may come down to one or two people for the entire “team.”

Home: About

Syllabus

Module -1 

Introduction to Cyber Security & its importance in IT

Industry

What is SOC & Importance of SOC?

Role & responsibilities of an SOC analyst

Introduction to Incident Response & Responsibilities of an Incident Response Analyst.

Module -2 

What is networking?

CIA Triangle

OSI Model & TCP IP Protocol Suite

Types of Network device and its working

Type of Network Security devices and its working 

Module-3

Internet layer & Transport Protocol

UDP & ICMP Protocol

Work group & Domain

Cryptography

Windows password & authentication

Module-4

Logs Analysis

Malware & Types of Malware

Malware Analysis  

Module-5

Attacking Phases

Different types of Real time Attacks

Introduction to Web application Security

Vulnerability v/s Threat v/s Risk 

Module-6

SIEM Solution

 

Module-7

SOC investigation tools 

Introduction to SIEM USECASES

Types of SIEM USECASES

 

Module-8

Investigating different real time use cases with mitigation steps.

How to handle Real time Security INCIDENTS.

 

 

Module-9

Social Engineering

Phishing & Types of Phishing attack

Investigating real-time Phishing attack

 

Module-10

MITRE Attack VS Cyber kill chain

 

Post Completion of 10 Modules, 2 classes will be only dedicated only for Resume building and Mock Interview

Home: Text

Get in Touch

Thanks for submitting!

Reviewing for the Exam
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by Cyber security SOC training. Proudly created with Wix.com

bottom of page