Security Operations Center (SOC) Analyst

Categories: Cybersecurity, SOC
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This course prepares participants to work effectively in a modern Security Operations Center. It focuses on real-time monitoring, analysis, and response to security incidents using SIEM platforms, threat intelligence feeds, and standardized operating procedures. It aligns with professional certifications standards and gives learners a strong foundation in cybersecurity operations and incident detection.

25 modules and 12 lab projects

What Will You Learn?

  • Understand SOC structures, analyst roles, and responsibilities
  • Master the security incident lifecycle and analyst tiering
  • Work with IOC, TTP, and threat intelligence concepts
  • Identify and analyze log sources from firewalls, IDS/IPS, and endpoints
  • Build and use SOC playbooks and runbooks
  • Deploy and configure open-source SIEM platforms (Wazuh, Splunk)
  • Normalize logs, create correlation rules, and fine-tune alerts
  • Detect threats using MITRE ATT&CK framework
  • Conduct threat hunting and malware triage activities
  • Perform incident escalation, documentation, and case handling
  • Coordinate with IR and forensic teams during investigations
  • Utilize EDR tools and advanced monitoring dashboards
  • Simulate real-world attacks in blue vs. red team scenarios

Course Content

Part 1: Introduction to SOC Operations

  • Module 1: SOC Structures, Roles, and Responsibilities
  • Module 2: Security Incident Lifecycle & Analyst Tiers
  • Module 3: Introduction to Threat Intelligence and IOC/TTP Concepts
  • Module 4: Log Sources: Firewalls, IDS/IPS, Endpoints, and Servers
  • Module 5: Understanding SOC Playbooks and Runbooks

Part 2: Log Analysis and SIEM Fundamentals

Part 3: Threat Detection and Investigation

Part 4: Incident Response and Escalation

Part 5: Advanced Monitoring and Blue Teaming

Student Ratings & Reviews

No Review Yet
No Review Yet
Scroll to Top