llm-red-bg mobile-banner
LLM Security & Red Teaming Masterclass

SOC Analyst Fast-Track
Bootcamp

Defend smarter, respond faster

15th-18th December 2025
8:00 PM - 10:00 PM (IST)

We don't have any bootcamps scheduled at the moment.

8 CPE
Tool Driven
Log Analysis
SIEM Practice

Special Offer

$99 $25
Request a Bootcamp
Why Attend?

Security Operations Centers (SOCs) are the backbone of modern cybersecurity. But real SOC analysts aren't made through theory; they're built through hands-on investigation, log analysis, and incident response practice. This bootcamp will give participants a ground-up understanding of SOC operations, tools, and frameworks through real-world simulations and guided analysis exercises.

What sets this training apart:

  • SOC in Action - Experience real alert triage, threat investigation, and incident response workflows.
  • Tool-Driven Training - Practice with Splunk, Wireshark, AlienVault OTX, and Volatility.
  • Threat Intelligence & Forensics - Analyze live threats, artifacts, and indicators of compromise (IOCs).
  • Incident Response Mastery - Apply the NIST IR lifecycle to simulated security events.
  • Career-Ready Skills - Build confidence for Tier-1 and Tier-2 SOC analyst roles, backed by 8 CPE credits.
Expert Speaker
Pushpinder

Sanyam

10+ Years of Experience

CEH | CSA | CND | CHFI | CTIA | CCISO | SOC | Security + | Pentest +

Sanyam brings over a decade of expertise in cyber defense, web application security, and threat hunting. Known for his hands-on teaching and operational depth, he has mentored numerous professionals to transition into active SOC and DFIR roles.

His specializations include:

  • Secure cloud and network architecture design (Azure, AWS, on-prem)
  • Zero Trust implementation and DevSecOps integration
  • Cloud compliance and risk governance frameworks (ISO 27001, NIST 2.0)
  • Identity and access management (IAM) and data protection strategies
  • Threat surface reduction through proactive architecture hardening

Having led security transformation initiatives across global enterprises, Pushpinder brings a practitioner's perspective on how to integrate threat modeling and risk mitigation directly into system design. He doesn't just secure systems—he teaches you how to think like an attacker, design like an architect, and defend like an auditor.

🔒 Limited Seats Available!

Secure Your Spot Now!

Claim the early-bird offer before it expires!

Request a Bootcamp
Agenda

Day 1: Introduction to Cybersecurity & SOC Foundations

What is Information Security & Cybersecurity

  • Difference between IT Security, Cybersecurity & Information Security
  • Key security principles (CIA Triad - Confidentiality, Integrity, Availability)
  • Real-world examples of breaches that led to SOC evolution

Introduction to SOC

  • What is a Security Operations Center
  • SOC structure: Tier-1, Tier-2, Tier-3
  • Roles & responsibilities in SOC
  • SOC mission, vision, and objectives

SOC Processes and Frameworks

  • People, Process & Technology
  • MITRE ATT&CK overview - why it matters for SOC

SOC Tools Landscape

  • Overview of SIEM, EDR, SOAR
  • Tool examples: Splunk, Wireshark, AlienVault OTX

Day 2: Understanding Logs, Alerts, and Network Visibility

What are Logs and Events

  • Sources: Firewall, IDS/IPS, Endpoint, Proxy, Authentication logs
  • Understanding fields: timestamp, source IP, destination IP, user, event ID
  • Windows Event Viewer demo screenshot (4624, 4625, 4688 examples)

Log Analysis and Correlation Concepts

  • How SIEM correlates logs
  • Alert generation logic - correlation rules and thresholds

Monitoring with Wireshark

  • What is packet capture (PCAP)
  • Reading packets: IP, TCP, DNS, HTTP

Identifying Indicators of Compromise (IOCs)

  • What are IOCs (IP, hash, domain)

Day 3: Digital Forensic & Threat Intelligence

Introduction to Threat Intelligence

  • Types: Strategic, Tactical, Operational, Technical
  • Threat feeds and platforms (AlienVault OTX, AbuseIPDB, VirusTotal)

Threat Intelligence Platforms & Framework

  • Understanding how to collect Threat Intelligence
  • Cyber Kill Chain

SOC Metrics and Continuous Improvement

  • Mean Time to Detect (MTTD), Mean Time to Respond (MTTR)
  • Importance of lessons learned and knowledge base updates

Introduction to Digital Forensics

  • Understanding Digital Forensics
  • Types of Digital Forensics
  • Tools used for forensics
  • 6 A's of forensics
  • Chain of Custody
  • Order of volatility

Wrap-Up Discussion

Day 4: Incident Handling & Threat Analysis

Incident Response and Triage

  • Understanding Incident Handling
  • NIST Incident Response lifecycle (Preparation, Detection, Analysis, Containment, Eradication, Recovery)
  • Alert Metrics: True Positive True Negative vs False Positive False Negative
  • Severity classification (Low, Medium, High)
  • Escalation flow between Tier-1 → Tier-2

Investigation Using Tools

  • Splunk dashboard example - searching and filtering alerts
  • Endpoint forensics with Volatility (memory analysis concept)
  • Understanding process injection / suspicious parent-child relationship

Vulnerability Assessment Basics

  • What are vulnerabilities, CVE, CVSS score
  • Overview of vulnerability scanners (Nessus/OpenVAS)

Career Path & Resources

  • SOC Tier-1 to Tier-3 and DFIR roles
  • Certifications roadmap

*Note: No access to recorded sessions will be shared for this bootcamp.

Key Takeaways
Earn 8 CPE Credits
Gain Hands-On SOC Experience
Learn SIEM, EDR, and Threat Intel Tools
Master Incident Response & Forensics
Understand SOC Metrics & Escalation Flows
Earn a Career Recognition Certificate

Interested in Joining the

Bootcamp?

Please Fill the Form

Our advisor will contact you with event details, and exclusive offers!