SOC Analyst

SOC (Security Operation Center) is the heart of corporate defenses. SOC is the eyes and ears of any traffic and actions inside the company’s network.

  • No Experience Necessary
  • Job Placement Assistance
  • Hands On Training

Description

This course is spread over a 10 sessions set schedule of four hours each to provide the learner in-depth and fast paced training designed to instill the skills needed for the aspiring SOC Analyst while providing without requiring a dedicated week of training.

The SOC (Security Operation Center) is the heart of corporate defenses. SOC is the eyes and ears of any traffic and actions inside the company’s network. To be a SOC analyst, you need a practical skill with security systems, offensive security and incident response alongside basic understanding of terminology, methodology, and countermeasures. Through theoretical and practical training, this course provides the whole skillset to become a SOC analyst for beginners with limited or no prior experience. 

  • Understand what is cyber and information security and gain familiarity with the cyber world and its basic terms
  • Understand the TCP/IP model and network/application protocols
  • Build and maintain Windows domain environment
  • Use SQL to manage and analyze relational databases
  • Plan an attack process over organization or applications
  • Execute a penetration test on web applications and networks
  • Maintain and set rule base of firewalls and SIEM

Audience

  • Candidates Seeking For A First Job In The Cybersecurity Industry
  • Candidates Who Wish To Be A Soc Analysts In Corporates

Prerequisites

  • There Is No Need For Prior Technical Knowledge. Candidates With High Technical Ability, Proficiency.

Duration

  • 40 Hours

Course Breakdown

This module presents the introduction to networking, while covering the networking elements, the OSI model, sniffing elements, common protocols, socket and other data that will enable the student to use this knowledge to navigate within the network and better secure it. This module also contains relevant data related to sysinternals, which helps to analyze Windows environments.

This module presents the expands the introduction to networking, while covering the networking elements, the OSI model, sniffing elements, common protocols, socket and other data that will enable the student to use this knowledge to navigate within the network and better secure it. This module also contains relevant data related to sysinternals, which helps to analyze Windows environments.

This module teaches important information about password attacks and enable the students to analyze Linux logs and use Linux persistency

This module equips the students with knowledge about the web and some of the attacks being out there, as well as the explanation about databases and particular the SQL.

This module introduces the student and begins to develop the skills how to find initial access to the organization and continues with ransomware analysis and particular cryptography basics.

This Module starts with practice of the Sysinternal resources and utilities. Following to that, this module covers logs of events in variety of systems and they way it’s used to identify security events.

Testimonials