40

Hours

5

Hands on Excercises

Beginner

Skill Level

New Career

Audience

English

Language

Share This Class:

Share on facebook
Share on twitter
Share on linkedin

Overview

The SOC (Security Operation Center) is the heart of corporate defenses. SOC is the eyes and ears of any traffic and actions inside the company’s network. To be a SOC analyst, you need a practical skill with security systems, offensive security and incident response alongside basic understanding of terminology, methodology, and countermeasures. Through theoretical and practical training, this course provides the whole skillset to become a SOC analyst for beginners with limited or no prior experience. 

Completing this course will help you:

Who is the course for?

This course is designed for candidates seeking their first job in the cyber security industry and IT professionals looking to transfer to a Security Operations Center team.

Syllabus - SOC Analyst

This module presents the introduction to networking, while covering the networking elements, the OSI model, sniffing elements, common protocols, socket and other data that will enable the student to use this knowledge to navigate within the network and better secure it. This module also contains relevant data related to sysinternals, which helps to analyze Windows environments.

This module presents the expands the  introduction to networking, while covering the networking elements, the OSI model, sniffing elements, common protocols, socket and other data that will enable the student to use this knowledge to navigate within the network and better secure it. This module also contains relevant data related to sysinternals, which helps to analyze Windows environments.

This module teaches important information about password attacks and enable the students to analyze Linux logs and use Linux persistency

This module equips the students with knowledge about the web and some of the attacks being out there, as well as the explanation about databases and particular the SQL.

This module introduces the student and begins to develop the skills how to find initial access to the organization and continues with ransomware analysis and particular cryptography basics.

 

This Module starts with practice of the Sysinternal resources and utilities. Following to that, this module covers logs of events in variety of systems and they way it’s used to identify security events.

What people are saying

Are You Ready To Start Your Career in Cyber security?

More Courses

You might also be interested in these courses

Intro to Cyber for Managers

Intro to Cyber for Managers

Lorem ipsum dolor sit amet, consectetur adipiscing elit. aulla sit amet magna sodales, interdum tortor etlert of dictum mauris loean ultricies lectus quis gravida urna interdum quam bibend.

Intro to Cyber for Managers

5 Consecutive day boot camp or 10 week course, 1 x four hour session per week
View Course

Intro to CISSP

Intro to CISSP

The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the CISSP certification exam held by (ISC) ²

Intro to CISSP

40 Hour course offered as a 5 day boot camp or 10 week flex schedule program
View Course

Curriculum

Introduction
Hardware Windows 10 - familiarity with Windows 10 OS, processes and services Networking - TCP/IP Model, Packet Tracer, Wireshark
Windows Domain Linux Domain
Examination
Offensive Security
Web - HTTP, HTML, JS, PHP Web Attacks - SQL Injection
Firewalls & VPN Splunk as a SIEM

The Market-Leading Cybersecurity Training and Simulation Platform

used by

Contact Us

  • This field is for validation purposes and should be left unchanged.
CONTACT

Start a rewarding career in cyber security!

+1 (210)729 6460

OUR ADDRESS

Cyber Range Solutions Inc
8000 IH 10 West Suite 600
San Antonio TX 78230

Cyber Range Solutions Inc. All Rights Reserved.

Book A Live Demo