Security Operations Analyst (SOC) L1
- Duration 30 Days
- Level Beginner
Course Overview
Huntmetrics SOC Course uniquely combines SOC Analyst and DFIR training, offering an unparalleled foundation for those aiming to excel in the cybersecurity field. This comprehensive program equips you with the essential skills to manage Security Operations Centers in large enterprises.
As a SOC Analyst, you’ll become adept at monitoring, managing, and configuring security tools, assessing incident urgency, and escalating complex issues. Transitioning to SOC Analyst, you’ll master incident response, remediate severe attacks, conduct thorough attack scope assessments, and engage in proactive threat hunting and malware analysis.
The curriculum covers SOC and SIEM fundamentals, Audit and Log Management, SIEM, EDR, and XDR tool configuration, Digital Forensics, and Incident Response (DFIR), Adversary Simulation, and Real-World Threat Hunting techniques, focusing on phishing and other prevalent cyber threats. With an emphasis on industry leading SIEM like Seceon, this course sets you on a path to becoming a distinguished professional in the cybersecurity arena.
Certification
The curriculum covers SOC and SIEM fundamentals, Audit and Log Management, SIEM, EDR, and XDR tool configuration, Digital Forensics, and Incident Response (DFIR), Adversary Simulation, and Real-World Threat Hunting techniques, focusing on phishing and other prevalent cyber threats. With an emphasis on industry leading SIEM like Seceon, this course sets you on a path to becoming a distinguished professional in the cybersecurity arena.
Course Objective
- Understand SOC Fundamentals
- Master Seceon for Security Monitoring
- Log Analysis
- Implement Threat Intelligence
- Enhance Threat Hunting Skills
- Master Digital Forensics Techniques
- Develop Malware Analysis Skills
- Strengthen Incident Response Capabilities
- Implement Security Automation and Orchestration
- Apply Industry Best Practices
Curriculum
16 Lesson
- What is a SOC
- SOC types
- Staff Roles
- Decision Making
- The Threat
- Attacker Motivation
- Attack Types
- Threat Attribution
- Threat Assessments
- Business Threats
- Employee Threats
- Cyber Kill Chain
- ATT&CK Framework
- Network Types
- Network Topologies
- Network Models
- IP Address & MAC Address
- Ports
- Protocols
- The Basics
- Identification
- Infection Methods
- Persistence Mechanisms
- Beacons
- Understanding Antivirus technologies
- Search Engines
- WHOIS
- Online Tools
- Social Networking & Communities
- Internet Archive
- Dark Web
- Threat Reporting
- Threat Intelligence
- CSIR Plan
- CSIR Models
- Sources
- Formats
- Implementation & Use
- Analysis
- What are SIEMs?
- Logging
- Evaluation
- Analytics
- Detection
- Threat Intelligence
- Reasons
- Initial Considerations
- Guidelines & Standards
- Further Considerations
- Normalizing Logs
- False Positive Reduction
- Prioritizing Alerts
- Identifying Genuine Incidents
- Analytics
- Creating reports
- Analyzing reports
- Communicating reports
- Attack Vectors & surface.
- Indicators of compromise
- Tactics, Techniques, and procedures
- Setting up detection rules on SIEM
- Incident response lifecycle
- Preparation and readiness
- Containment strategies and techniques
- Eradication and Recovery
- Forensics analysis of systems & network devices
- Collecting and handling of evidence
- Forensics investigation
- Writing forensics reports
- Understanding Threat intelligence
- Sources of Threat intelligence
- Applying threat intelligence in SOC operations
- Participants will work in teams to simulate a SOC operation, from monitoring to incident response, based on a realistic cyber threat scenario.
- Review and preparation for the Level 1 SOC Analyst certification exam.
- Certification exam: An assessment covering all course materials to qualify participants as Level 1 SOC Analysts.
₹xxx / Until April 2024
Skills You Will Gain
- The threats and risks to a business network
- Gain a better understanding of threat intelligence using OSINT
- How malicious software can compromise a system
- Using SIEM tools to collate and analyze data of interest
- Fundamental and in-depth logging
- Analytical techniques