Course Details : Certified SOC Ananlysis

Overview

SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements.

Schedule


Virtual Classroom
-
Online

Course Fee

Apply Now

What you will learn


Outline


Cyber Security Operation (SOC)

Cyber Security Operation (SOC) o Introduction o Security Operations Center (SOC) o SOC Daily Operational Tasks o Log Management o Security Alerts o Security Alert Use Cases o Actionable Reports

Class 1

Networking Basics

o What is Networking o OSI Model & TCP IP Protocol Suite o Types of Netowrk Device and Working o Types of Network Security Devices and Working

Class 2

Foundation of Bit/Bites in Packets:

o Bit, Hexadecimal & Bytes Representation o MAC Address & IP Address o NAT o PAT o Basics of Wireshark & Tshark

Class 3

Internet Layer & Transport Layer

o What is the Internet Layer & IP Header o What are the IP Header Fields o What is the Transport Layer & TCP Header o What are the Transport Header Fields o What are the common attacks performed with Transport Layer

Class 4

UDP & ICMP Protocol

o What is UDP Protcol & UDP Header o What are the UDP Header Fields o What is the ICMP Protocol & ICMP Header o What are the ICMP Header Fields o Common Attacks Performed with ICMP Protocol

Class 5

Protocols & Ports

o Protocols v/s Ports o What is ARP Protocol o Client-Server Model o What Is HTTP & How does it works o What is DHCP & How does it works o What is DNS & How does it works o Basics of FTP, Telnet, SSH & SMTP

Class 6

Cyber Security Layers of Defense and Technology Solutions:

o Layers of Defense and Technology Solutions - Introduction o Layers of Defense and Technology Solutions - Access Control I o Layers of Defense and Technology Solutions - Access Control II o Layers of Defense and Technology Solutions - Application Security o Layers of Defense and Technology Solutions - Data Security Encryption o Layers of Defense and Technology Solutions - Data Security DLP o Layers of Defense and Technology Solutions - Data Security DRM o Layers of Defense and Technology Solutions - Host Security AV o Layers of Defense and Technology Solutions - Host Security AW o Layers of Defense and Technology Solutions - Host Security NGES o Layers of Defense and Technology Solutions - Host Security FIM o Layers of Defense and Technology Solutions - Host Security FDE o Layers of Defense and Technology Solutions - Network Security Firewall o Layers of Defense and Technology Solutions - Network Security IPS o Layers of Defense and Technology Solutions - Network Security NAC o Layers of Defense and Technology Solutions - Network Security WSG o Layers of Defense and Technology Solutions - Cloud Security o Layers of Defense and Technology Solutions - SIEM 1 o Layers of Defense and Technology Solutions - SIEM 2 o Layers of Defense and Technology Solutions - Vulnerability Scanners o Layers of Defense and Technology Solutions - Summary

Class 7

Incident Response

o Introduction to Incident Response o Incident Response Phases o Incident Response Real World Scenario I o Incident Response Real World Scenario II o Incident Response Real World Scenario III o Incident Response Real World Scenario IV o Incident Response Roles of Analysts o Incident Response Team o Incident Response Jump Kit o Managed Security Services Providers (MSSP) o Incident Response Retainer Service

Class 8

Identity and access Management:

o Introduction to Identity and Access Management

Class 9

Prerequisites


Class lab


Who should attend