BECOME A
SOC ANALYST
IN 8 WEEKS
Welcome Future SOC Analysts!
Throughout a seven-week program, future SOC Analysts will learn the essentials for safeguarding organizations. The training prepares individuals to defend digital assets against cyber threats, ensuring compliance and security infrastructure proficiency in the dynamic cybersecurity landscape.
Class Sessions 2024
November 9th - December 11th
March 1st - April 16th
-
-
Lesson 1: What is SOC
In this lesson, we’ll introduce the Security Operations Center (SOC), a central hub responsible for monitoring and protecting an organization’s digital assets. We'll cover its role in detecting, analyzing, and responding to cybersecurity threats, as well as the key team members involved, such as SOC Analysts and Incident Responders. This lesson sets the foundation for understanding how SOCs maintain security in a constantly evolving threat landscape.
In this lesson, we’ll introduce the Security Operations Center (SOC), a central hub responsible for monitoring and protecting an organization’s digital assets. We'll cover its role in detecting, analyzing, and responding to cybersecurity threats, as well as the key team members involved, such as SOC Analysts and Incident Responders. This lesson sets the foundation for understanding how SOCs maintain security in a constantly evolving threat landscape.
-
Lesson 2: The Role of SOC in an Organization's Security Posture
This lesson explores how a Security Operations Center (SOC) enhances an organization’s security posture by continuously monitoring, detecting, and responding to cyber threats. We'll discuss the SOC's impact on identifying vulnerabilities, managing risks, and ensuring compliance, highlighting the importance of both proactive and reactive security measures.
This lesson explores how a Security Operations Center (SOC) enhances an organization’s security posture by continuously monitoring, detecting, and responding to cyber threats. We'll discuss the SOC's impact on identifying vulnerabilities, managing risks, and ensuring compliance, highlighting the importance of both proactive and reactive security measures.
-
Lesson 3: Different Types of SOCs
In this lesson, we'll examine the various types of Security Operations Centers (SOCs), including in-house, outsourced, and hybrid models. We’ll explore the advantages and challenges of each type, helping students understand how organizations choose the SOC structure that best fits their security needs.
In this lesson, we'll examine the various types of Security Operations Centers (SOCs), including in-house, outsourced, and hybrid models. We’ll explore the advantages and challenges of each type, helping students understand how organizations choose the SOC structure that best fits their security needs.
-
Lesson 4: SOC Operations & Processes
This lesson focuses on the core operations and processes within a Security Operations Center (SOC). We’ll cover how SOCs monitor for threats, manage incidents, conduct threat analysis, and ensure compliance. Students will gain insight into the standard workflows and tools that enable a SOC to effectively protect an organization.
This lesson focuses on the core operations and processes within a Security Operations Center (SOC). We’ll cover how SOCs monitor for threats, manage incidents, conduct threat analysis, and ensure compliance. Students will gain insight into the standard workflows and tools that enable a SOC to effectively protect an organization.
-
-
-
Lesson 5: What is SIEM?
In this lesson, we’ll introduce Security Information and Event Management (SIEM) systems, a crucial tool used in SOCs. We’ll cover how SIEM solutions collect, analyze, and correlate security data from various sources, enabling SOC teams to detect and respond to potential threats more effectively.
In this lesson, we’ll introduce Security Information and Event Management (SIEM) systems, a crucial tool used in SOCs. We’ll cover how SIEM solutions collect, analyze, and correlate security data from various sources, enabling SOC teams to detect and respond to potential threats more effectively.
-
Lesson 6: SIEM Use Cases
In this lesson, we’ll explore practical use cases of Security Information and Event Management (SIEM) systems. We’ll examine how SIEMs are applied in real-world scenarios, such as detecting insider threats, monitoring compliance, identifying advanced persistent threats (APTs), and responding to security incidents, illustrating the value SIEMs bring to SOC operations.
In this lesson, we’ll explore practical use cases of Security Information and Event Management (SIEM) systems. We’ll examine how SIEMs are applied in real-world scenarios, such as detecting insider threats, monitoring compliance, identifying advanced persistent threats (APTs), and responding to security incidents, illustrating the value SIEMs bring to SOC operations.
-
Lesson 7: SIEM Tools & Techniques
This lesson will focus on the various tools and techniques used in Security Information and Event Management (SIEM) systems. We’ll discuss popular SIEM platforms, key features like log management and correlation, and techniques for optimizing SIEM performance. Students will learn how these tools and techniques help SOC teams enhance threat detection and incident response capabilities.
This lesson will focus on the various tools and techniques used in Security Information and Event Management (SIEM) systems. We’ll discuss popular SIEM platforms, key features like log management and correlation, and techniques for optimizing SIEM performance. Students will learn how these tools and techniques help SOC teams enhance threat detection and incident response capabilities.
-
Lesson 8: SIEM Log Collection & Analysis
This lesson will focus on the various tools and techniques used in Security Information and Event Management (SIEM) systems. We’ll discuss popular SIEM platforms, key features like log management and correlation, and techniques for optimizing SIEM performance. Students will learn how these tools and techniques help SOC teams enhance threat detection and incident response capabilities.
This lesson will focus on the various tools and techniques used in Security Information and Event Management (SIEM) systems. We’ll discuss popular SIEM platforms, key features like log management and correlation, and techniques for optimizing SIEM performance. Students will learn how these tools and techniques help SOC teams enhance threat detection and incident response capabilities.
-
-
-
Lesson 9: What's EDR?
In this lesson, we’ll introduce Endpoint Detection and Response (EDR) systems, a vital component in modern cybersecurity. We’ll cover how EDR tools monitor and respond to threats on endpoints, such as computers and servers, and how they complement other security measures within a SOC to provide comprehensive protection against cyber threats.
In this lesson, we’ll introduce Endpoint Detection and Response (EDR) systems, a vital component in modern cybersecurity. We’ll cover how EDR tools monitor and respond to threats on endpoints, such as computers and servers, and how they complement other security measures within a SOC to provide comprehensive protection against cyber threats.
-
Lesson 10: EDR Tools & Technologies
This lesson explores the tools and technologies used in Endpoint Detection and Response (EDR) systems. We’ll discuss key EDR platforms, their features for threat detection and response, and how they integrate with other security solutions to protect endpoints and enhance overall cybersecurity.
This lesson explores the tools and technologies used in Endpoint Detection and Response (EDR) systems. We’ll discuss key EDR platforms, their features for threat detection and response, and how they integrate with other security solutions to protect endpoints and enhance overall cybersecurity.
-
Lesson 11: EDR Techniques & Methodologies
In this lesson, we’ll cover the techniques and methodologies employed in Endpoint Detection and Response (EDR) systems. We’ll explore approaches for threat detection, incident investigation, and response strategies, as well as best practices for effectively leveraging EDR tools to safeguard endpoints against cyber threats.
In this lesson, we’ll cover the techniques and methodologies employed in Endpoint Detection and Response (EDR) systems. We’ll explore approaches for threat detection, incident investigation, and response strategies, as well as best practices for effectively leveraging EDR tools to safeguard endpoints against cyber threats.
-
Lesson 12: EDR Incident Detection & Response
This lesson focuses on how Endpoint Detection and Response (EDR) systems detect and respond to security incidents on endpoints. We’ll cover the process of identifying suspicious activity, analyzing alerts, and taking appropriate response actions to mitigate threats and minimize damage, ensuring robust endpoint protection.
This lesson focuses on how Endpoint Detection and Response (EDR) systems detect and respond to security incidents on endpoints. We’ll cover the process of identifying suspicious activity, analyzing alerts, and taking appropriate response actions to mitigate threats and minimize damage, ensuring robust endpoint protection.
-
You Got This!
“You are confined only by the walls you build yourself”.
Step out of your comfort zone, face your fears, and watch as those walls crumble before you. You are capable of achieving great things once you believe in yourself and your abilities. So go forth with confidence and let nothing hold you back. The world is waiting for you to shine!