University College of Engineering
Osmania University (UCEOU)​

Security Operations Center (SOC) & (SOAR) Analyst

Experience groundbreaking collaboration as Academia, Industry, and Technology converge in our inaugural SOC Analyst Program

Duration
2 Months

80+ Hours

80% Practical learning

Online & Offline classes

ou-logo-final

University College of Engineering
Osmania University (UCEOU)​

Security Operations Center (SOC) & (SOAR) Analyst

Experience groundbreaking collaboration as Academia, Industry, and Technology converge in our inaugural SOC Analyst Program

Duration
2 Months

80+ Hours

80% Practical learning

Online & Offline classes

Security Operations Analyst (SOC) & (SOAR)

Course Overview

Our groundbreaking SOC & SOAR Analyst program, where OU, Huntmetrics, and technology leaders converge to deliver a transformative learning experience. In this inaugural course, you’ll benefit from the collective expertise of renowned academics, industry leaders, and our technology partner, ensuring you’re equipped with the latest tools and insights to excel in the dynamic field of cybersecurity. 

Join us at the forefront of innovation and be part of a collaborative journey that sets new standards in SOC Analyst training, for the first time in India.

The SOC Analyst Course combines SOC, Incident Response, and Digital Forensics Training, offering a strong foundation for excelling in cybersecurity. Participants gain skills in managing Security Operations Centers (SOCs) in large enterprises.

 

Our Value Proposition

Key Take-aways

  • Foster Expertise: Cultivate cybersecurity experts for comprehensive assessments and tests.
  • Promote Innovation: Encourage creative solutions for evolving cybersecurity challenges
  • Ensure Real-World Relevance: Provide practical experience for applying knowledge in real scenarios
  • Empower Decision-Making: Equip with skills for strategic risk management and strategy development.
  • Drive Industry Standards: Set benchmarks for excellence in cybersecurity operations management.
  • Facilitate Community Collaboration: Foster knowledge-sharing among cybersecurity professionals.

Who is this Program for

  • Engineering Grads interested in Cybersecurity
  • Cybersecurity Enthusiasts
  • IT Professionals
  • Future Cybersecurity Leaders
  • Career Changers

Become a Cyber Guardian:
Transform your career with SOC & SOAR Analyst training

Curriculum

  1. What is a SOC
  2. SOC types
  3. Staff Roles
  4. Decision Making
  1. The Threat
  2. Attacker Motivation
  3. Attack Types
  4. Threat Attribution
  5. Threat Assessments
  6. Business Threats
  7. Employee Threats
  8. Cyber Kill Chain
  9. ATT&CK Framework
  1. Network Types
  2. Network Topologies
  3. Network Models
  4. IP Address & MAC Address
  5. Ports
  6. Protocols
  1. The Basics
  2. Identification
  3. Infection Methods
  4. Persistence Mechanisms
  5. Beacons
  6. Understanding Antivirus technologies
  7.  
  1. Search Engines
  2. WHOIS
  3. Online Tools
  4. Social Networking & Communities
  5. Internet Archive
  6. Dark Web
  7. Threat Reporting
  8. Threat Intelligence
  1. Sources
  2. Formats
  3. Implementation & Use
  4. Analysis
  1. What are SIEMs?
  2. Logging
  3. Evaluation
  4. Analytics
  5. Detection
  6. Threat Intelligence
  1. Log Management
  2. Threat Intelligence & Detection
  3. Notifications & Alerts
  4. Intelligent Incident Identification
  1. Implementation Planning
  2. Deployment
  3. Integration
  4. Post Implementation
  1. Reasons
  2. Initial Considerations
  3. Guidelines & Standards
  4. Further Considerations
  1. Normalizing Logs
  2. False Positive Reduction
  3. Prioritizing Alerts
  4. Identifying Genuine Incidents
  5. Analytics
  1. Creating reports
  2. Analyzing reports
  3. Communicating reports
  1. Attack Vectors & surface.
  2. Indicators of compromise
  3. Tactics, Techniques, and procedures
  4. Setting up detection rules on SIEM
  1. Incident response lifecycle
  2. Preparation and readiness
  3. Containment strategies and techniques
  4. Eradication and Recovery
  1. Forensics analysis of systems & network devices
  2. Collecting and handling of evidence
  3. Forensics investigation
  4. Writing forensics reports
  1. Understanding Threat intelligence
  2. Sources of Threat intelligence
  3. Applying threat intelligence in SOC operations
  1. Participants will work in teams to simulate a SOC operation, from monitoring to incident response, based on a realistic cyber threat scenario.
  2. Review and preparation for the Level 1 SOC Analyst certification exam.
  3. Certification exam: An assessment covering all course materials to qualify participants as Level 1 SOC Analysts.
  1. What is a SOC
  2. SOC types
  3. Staff Roles
  4. Decision Making
  1. The Threat
  2. Attacker Motivation
  3. Attack Types
  4. Threat Attribution
  5. Threat Assessments
  6. Business Threats
  7. Employee Threats
  8. Cyber Kill Chain
  9. ATT&CK Framework
  1. Network Types
  2. Network Topologies
  3. Network Models
  4. IP Address & MAC Address
  5. Ports
  6. Protocols
  1. The Basics
  2. Identification
  3. Infection Methods
  4. Persistence Mechanisms
  5. Beacons
  6. Understanding Antivirus technologies
  7.  
  1. Search Engines
  2. WHOIS
  3. Online Tools
  4. Social Networking & Communities
  5. Internet Archive
  6. Dark Web
  7. Threat Reporting
  8. Threat Intelligence
  1. Sources
  2. Formats
  3. Implementation & Use
  4. Analysis
  1. What are SIEMs?
  2. Logging
  3. Evaluation
  4. Analytics
  5. Detection
  6. Threat Intelligence
  1. Log Management
  2. Threat Intelligence & Detection
  3. Notifications & Alerts
  4. Intelligent Incident Identification
  1. Implementation Planning
  2. Deployment
  3. Integration
  4. Post Implementation
  1. Reasons
  2. Initial Considerations
  3. Guidelines & Standards
  4. Further Considerations
  1. Normalizing Logs
  2. False Positive Reduction
  3. Prioritizing Alerts
  4. Identifying Genuine Incidents
  5. Analytics
  1. Creating reports
  2. Analyzing reports
  3. Communicating reports
  1. Attack Vectors & surface.
  2. Indicators of compromise
  3. Tactics, Techniques, and procedures
  4. Setting up detection rules on SIEM
  1. Incident response lifecycle
  2. Preparation and readiness
  3. Containment strategies and techniques
  4. Eradication and Recovery
  1. Forensics analysis of systems & network devices
  2. Collecting and handling of evidence
  3. Forensics investigation
  4. Writing forensics reports
  1. Understanding Threat intelligence
  2. Sources of Threat intelligence
  3. Applying threat intelligence in SOC operations
  1. Participants will work in teams to simulate a SOC operation, from monitoring to incident response, based on a realistic cyber threat scenario.
  2. Review and preparation for the Level 1 SOC Analyst certification exam.
  3. Certification exam: An assessment covering all course materials to qualify participants as Level 1 SOC Analysts.

University College of Engineering, Osmania University (UCEOU)

X

Tools you will learn

Technology Partners

Our Industry Experts

Shaikh AbdulKhader

Chief Technology Security Officer

A visionary cybersecurity leader with over 25 years of experience, boasting exceptional proficiency in cybersecurity, IT, and emerging technologies like IoT and IIoT. With a notable track record as a Chief Information Security Officer (CISO) at prominent organizations such as Qatar Petrochemical Company and Vodafone, he has demonstrated his prowess in establishing robust enterprise information security and risk management programs. His expertise spans Information Security Governance, SIEM, IAM, and Incident Crisis Management. With a rich background encompassing roles at Tata Consultancy Services and leading banks, he brings unparalleled insight and strategic foresight to our cybersecurity courses.

Bheem Reddy

Associate Director of Information Technology, Indian Navy

Cdr Bheem Reddy is an entrepreneur and a veteran Indian Navy officer, having served for over 22 years. During his stint in the Indian Navy, Bheem had spent over 8 years in combat role at sea, he had carried out diplomatic and overseas assignments for India in 5 countries. Whilst in service he had specialised in the IT and Cybersecurity. He is also an alumnus of IIM Lucknow, JBIMS Mumbai and the prestigious Indian Naval War College Goa. During his Naval career, he steered large scale projects of national Security importance, including establishment of Security Operations Centre for Indian Navy and has published policy level documents for the Ministry of Defence.

Vinod Babu

Cyber Security Training Expert

A seasoned trainer and speaker with over two decades of IT experience, currently pursuing a PhD in Computer Science from KL University. With an MTech from BITS Pilani and numerous cybersecurity certifications, he possesses a wealth of knowledge in areas including threat intelligence, web application vulnerability testing, and digital forensics. Vinod has delivered cybersecurity training and consulting projects in India, USA, UAE, Saudi Arabia, Thailand, Singapore, Malaysia, Sri Lanka, Cambodia, Netherlands, showcasing his expertise to senior IT teams in Corporate, Government, and Banking sectors. His specialization in Takedown Services for online abuse underscores his commitment to combatting cyber threats and safeguarding digital platforms.

Our Advisors/ Mentors

60028ae3-7cad-4a14-8521-40c0441473f2

Sri Harpeet Singh
Ex Principal Secretary IT, Telangana
A retired IAS officer from the Telangana cadre, graduated from IIT Mumbai and IIM Kolkata. He pursued a successful civil services career from 1991 to 2022. His tenure as Joint Secretary in the Ministry of IT in undivided Andhra Pradesh was instrumental in positioning Hyderabad as a prominent IT destination, attracting investments from major tech giants to Hyderabad. As Secretary of the Public Service Commission in Andhra Pradesh in 2008, he automated and digitized application processes, setting a benchmark for other states. As the first Secretary of IT in Telangana in 2014-15, he established T-Hub, India’s largest incubation center.

8f876ac2-3b3e-4fc9-84a9-b6f1c6ced2b9

Dr. V Sarma

With over 36 years of expertise in Blockchain, Cryptography, IoT, AI, and ML, Dr. Sarma is a distinguished professional. He has authored 65+ papers in esteemed international publications and has actively participated in various national and international symposiums. Following his retirement from Government service in June 2020, he played a pivotal role in establishing the RubiX Blockchain Platform and mentors Postgraduate/PhD candidates in Blockchain and Cryptography at Amrita University. Additionally, he serves as the Director at the CR Rao Advanced Institute of Mathematics, Statistics & Computer Science, University of Hyderabad. With a notable career at ISRO spanning 30 years, he retired as Group Director. Dr. Sarma is also a visiting Scientist at the Georgia Institute of Technology.

Reach Us

Location

College of Engineering, Osmania University Main Rd, Osmania University, Amberpet, Hyderabad, Telangana 500007

Mail

ou@huntmetrics.io

Contact

+919573282020

Copyright © 2024 Huntmetrics All rights reserved