Overview
This course is created to help participants learn more about SOC as well as to provide them with the necessary skills and background to get started in this sector. 
 
SOC is used to protect against potential cyberattacks and requires rapid monitoring and response. The longer a cybersecurity incident goes before it is remediated, the greater the potential damage and expense to the organization.
 
Addressing these threats is the responsibility of an organization’s Security Operations Center (SOC). The SOC should provide round-the-clock monitoring for cyber threats and the ability to engage immediately in incident response.
 
In this course, each topic will be taught with real live examples of how to overcome specific challenges in a genuine assault situation. The course will cover both theory and hands-on practice in our lab.
What will you Learn?
Introduction to Cybersecurity
- Cyber Attacks
 
- Cyber Kill Chain
 
- Attackers' Tools Vs Techniques
 
- Defense in Depth
 
- CVE
 
 
Introduction to SOC
- What is SOC?
 
- Objectives of SOC
 
- SOC Environment
 
- SOC Core Roles and Duties
 
 
Introduction to Network Security
- What is Network Security?
 
- Network Terminologies
 
- Network Models
 
- Network Security Protections
 
- Network Security Tools
 
 
Endpoint Security
- What is Endpoint Security?
 
- Endpoint Security Controls
 
 
Web Security Analysis
- How does Web Work?
 
- OWASP Top 10
 
- Web Application Scanners
 
 
Introduction to Email
- Email Structure
 
- Email Protocols
 
- Email Anatomy
 
- Email Analysis
 
 
Introduction to Logs and Events
- Log Files
 
- Events
 
- Log Forwarding
 
- Log Attributes
 
- Event Classification
 
- Security-Related Event Log
 
- Windows Log
 
 
Security Information and Event Management
- What is SIEM?
 
- SIEM Components
 
- SIEM Tools
 
- SIEM Use Cases
 
 
Splunk
- Splunk Architecture
 
- Splunk Usage
 
 
Incident Response
- What is Incident Response?
 
- Incident Response Plan
 
- Incident Response Process
 
 
Digital Forensics
- What is Digital Forensics?
 
- Digital Foreniscs Process
 
- Disk Analysis
 
- Memory Analysis
 
- Browser Forensics
 
- Incident Reporting
 
 
 
Why Do You Need This Course?
- SOC analysis is needed to help businesses stay safe from cybercrime, data loss, and other digital security breaches by identifying threats.
 
- SOC is vital to the cybersecurity infrastructures of many organizations and companies.
 
- Acquiring a certification in SOC will open new opportunities to get hired as many companies are looking for SOC analysts to defend and secure their business.