Learn Today, Lead Tomorrow with the thrilling Diwali offers! Buy 1 Get 1 Free | Offer ending in:
D H M S Grab Now
X

SOC Analyst Online Training Course
Read Reviews

The SOC Analyst training curriculum has been carefully crafted to provide aspiring and present SOC Analysts with a thorough knowledge of SOC operations and processes. Learn to recognize and respond to information security incidents, create and track security events like alerts, and conduct security investigations. Learn tools like Splunk and Security Onion.

Watch Intro Video

SOC Analyst Course Highlights

  • 40 hrs of instructor-led training
  • Get CPE Certificate
  • Certified & Experienced Trainers
  • Session for Interview Prep

Accredited By

SOC Analyst TRAINING CALENDAR

Start Date End Date Start/End Time Batch Type Training Mode Batch Status
15 Oct 2022 20 Nov 2022 09:00 - 13:00 (IST) Weekend Online [ Open ] Enroll
View Offers

Buy 1 Get 2 Combo Offer

Infosectrain offer Buy 1 Get 2 Combo Offer: Register for SOC Analyst and get 2 eLearning (Self-paced Learning) Courses 100% free. Don't miss this offer Enroll Now

  • Cyber Security Fundamentals (19hrs on-demand video Worth USD 49)
  • SOC Analyst Masterclass (3.5hrs on-demand video Worth USD 49)

Register

#learntorise

SOC Analyst Tools Covered

Choose your Preferred Learning Mode

1-TO-1 TRAINING

Customized schedule
Learn at your dedicated hour
Instant clarification of doubt
Guaranteed to run

Get Started

ONLINE TRAINING

Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Classes starting from

5th Sep: Weekend

15th Sep: Weekday

ENROLL NOW Preferred

CORPORATE TRAINING

Anytime, Anywhere – Across The Globe
Hire A Trainer
At Your Own Pace
Customized Corporate Training

Contact US For Business

Looking for a customized training?

REQUEST A BATCH

SOC Analyst Course Description

Overview

SOC Analysts play a crucial position in today’s security teams since they are on the front lines of cyber defense, identifying and responding to cyber threats as they occur.

The InfosecTrain’s SOC Analyst training course is specifically created for aspiring and current SOC Analysts who want to learn how to prevent, identify, assess, and respond to cybersecurity threats and incidents. The course is the first level of a course series that includes Level 1-SOC Analyst and Level 2-SOC Specialist, and is specifically designed to assist you in mastering over trending and in-demand technical abilities to carry out numerous sophisticated SOC activities.

The course begins with the fundamentals of SOC teams and Blue Team operation architecture before moving on to more advanced topics such as digital forensics, incident response, threat intelligence, and SIEM (Security Incident and Event Management) solutions.

This training course also helps participants plan their preparation for the SOC Analyst certification examinations, which are required to obtain the most sought-after position in the SOC team.

Why SOC Analyst with Infosec Train ?

InfosecTrain is a leading technology and security training and consulting firm specializing in various IT security courses and services. We constantly provide the finest level of service and have the highest success rate in the industry. Our SOC Analyst training aims to improve your skills required in Security Operation Center and the following benefits:

  • We provide hands-on experience with tools like Splunk and Security Onion.
  • We assist SOC teams in understanding successful strategies and best practices.
  • We can help you present your qualifications and work experience for the position of SOC Analyst.
  • We provide a flexible training schedule.
  • We provide recorded videos after the session.
  • We offer post-training support.
  • We also provide a certificate of participation to each candidate.

Target Audience

The SOC Analyst training course is exclusively designed for:

  • Technical Support Engineers
  • System Administrators
  • Security Consultants
  • Cyber Security Analysts
  • Security System Engineers
  • SOC Analysts (L1 & L2)
  • Information Security Researcher

Pre-requisites

  • Prior knowledge of networking fundamentals, OS basics, troubleshooting is recommended
  • Experience as an entry-level SOC Analyst, Cyber Security Analyst, Information Security role
  • Experience of two years in the Information Security domain
  • Security+ or CEH Certification Experience Equivalent

Exam Information

There is no particular exam for this course, and its curriculum is meant to help participants pass a variety of exams to become SOC Analysts.

GET A FREE DEMO CLASS

For
Captcha*
9 + 51 =
loader-infosectrain

SOC Analyst Course Objectives

This SOC Analyst training course allows you to:

  • Understand the Security Operation Center (SOC) team operations
  • Understand Blue Team operations architecture
  • In-depth knowledge of digital forensics, threat intelligence, and incident response
  • Understand technical strategies, tools, and procedures to safeguard data for your organization
  • Understand essential SOC tools like Splunk and Security Onion
  • Understand how to recognize threats and implement countermeasures

SOC Analyst Course Content

Domain 1: Blue Team Operations Architecture

  • Building a successful SOC
  • Functions of SOC
  • SOC Models & Types
  • SOC Teams & Roles
  • Heart of SOC- SIEM
  • Gartner’s magic quadrant – TOP SIEM
  • SIEM guidelines and architecture

Domain 2: SOC Tools

  1. Splunk:
    • Industrial requirements of Splunk in various fields
    • Splunk terminologies, search processing language, and various industry use cases
    • Splunk universal forwarder, data inputs, Correlating Events, Search fields
  2. Security Onion:
    • Introduction to Security Onion : NSM
    • Security Onion Architecture
    • Walkthrough to Analyst Tools
    • Alert Triage and Detection
    • Hunt with Onion

Domain 3: DFIR

Fundamentals of Digital Forensics

  • Forensics Fundamentals
  • Introduction to Digital Forensics
  • Hard Drive Basics
    • Platters, sectors, clusters, slack space
  • SSD Drive Basics
    • Garbage, collection, TRIM, wear leveling
  • File Systems
    • FAT16, FAT32, NTFS, EXT3/EXT4, HFS+/APFS
  • Metadata & File Carving
  • Memory, Page File, and Hibernation File
  • Order of Volatility
  • Evidence Forms
  • Volatile Evidence
    • Memory RAM, Cache, Registers content, Routing tables, ARP cache, process table, kernel statistics, temporary file system/swap space
  • Disk Evidence
    • Data on Hard Disk or SSD
  • Network Evidence
    • Remotely Logged Data, Network Connections/Netflow, PCAPs, Proxy logs
  • Web & Cloud Evidence
    • Cloud storage/backups, chat rooms, forums, social media posts, blog posts
  • Evidence Forms
    • Laptops, desktops, phones, hard drives, tablets, digital cameras, smartwatches, GPS
  • Chain of Custody
  • What is the Chain of Custody?
  • Why is it Important?
    • In regard to evidence integrity and examiner authenticity
  • Guide for Following the Chain of Custody
    • Evidence collection, reporting/documentation, evidence hashing, write-blockers, working on a copy of original evidence
  • Windows Investigations
  • Artifacts
    • Registry, Event Logs, Prefetch, .LNK files, DLLs, services, drivers, common malicious locations, schedules tasks, start-up files

*nix Investigations

  • Artifacts
  • Equipment
    • Non-static bags, faraday cage, labels, clean hard drives, forensic workstations, Disk imagers, hardware write blockers, cabling, blank media, photographs, Laptops, desktops, phones, hard drives, tablets, websites, forum posts, blog posts, social media posts, chat rooms, Types of Hard Drive Copies visible data, bit for bit, slackspace
  • Live Forensics
  • Live Acquisition
    • What is a live acquisition/live forensics? Why is it beneficial?
  • Products
    • SysInternals, Encase, memory analysis with agents, Custom Scripts
  • Potential Consequences
    • Damaging or modifying evidence making it invalid
  • Post-Investigation
  • Report Writing
  • Evidence Retention
    • Legal retention periods, internal retention periods
  • Evidence Destruction
    • Overwriting, degaussing, shredding, wiping
  • Further Reading

Tools exposure provided in the above section:

  • Command-LINE for Windows / Linux
  • Network Analysis: Wireshark, Network Miner
  • Disk Based Forensics: FTK IMAGER, AUTOPSY, Encase
  • Memory Forensics: MAGNATE & BELKASOFT RAM CAPTURE, DumpIt, Volatility, Volatility WorkBench
  • Email Forensics: Manual & Automated Analysis

Incident Response Basics

  • Introduction to Incident Response
  • What is an Incident Response?
  • Why is IR Needed?
  • Security Events vs. Security Incidents
  • Incident Response Lifecycle – NIST SP 800 61r2
  • Incident Response Plan : Preparation, Detection & Analysis, Containment, Eradication, Recovery, Lessons Learned
  • Case Study : Cyber Kill Chain in Incident Response
  • Lockheed Martin Cyber Kill Chain
    • What is it, why is it used
  • MITRE ATT&CK Framework
    • What is it, why is it used
  • Preparation
  • Incident Response Plans, Policies, and Procedures
  • The Need for an IR Team
  • Asset Inventory and Risk Assessment to Identify High-Value Assets
  • DMZ and Honeypots
  • Host Defences
    • HIDS, NIDS
    • Antivirus, EDR
    • Local Firewall
    • User Accounts
    • GPO
  • Network Defences
    • NIDS
    • NIPS
    • Proxy
    • Firewalls
    • NAC
  • Email Defences
    • Spam Filter
    • Attachment Filter
    • Attachment Sandboxing
    • Email Tagging
  • Physical Defences
    • Deterrents
    • Access Controls
    • Monitoring Controls
  • Human Defences
    • Security Awareness Training
    • Security Policies
    • Incentives

Detection and Analysis

  • Common Events and Incidents
  • Establishing Baselines and Behavior Profiles
  • Central Logging (SIEM Aggregation)
  • Analysis (SIEM Correlation)

Containment, Eradication, Recovery

  • CSIRT and CERT Explained
    • What are they, and why are they useful?
  • Containment Measures
    • Network Isolation, Single VLAN, Powering System(s) Down, Honeypot Lure
  • Taking Forensic Images of Affected Hosts
    • Linking Back to Digital Forensics Domain
  • Identifying and Removing Malicious Artefacts
    • Memory and disk analysis to identify artefacts and securely remove them
  • Identifying Root Cause and Recovery Measures

Lessons Learned

  • What Went Well?
    • Highlights from the Incident Response
  • What Could be Improved?
    • Issues from the Incident Response, and How These Can be Addressed
  • Important of Documentation
    • Creating Runbooks for Future Similar Incidents, Audit Trail
  • Metrics and Reporting
    • Presenting Data in Metric Form
  • Further Reading

Tools exposure provided in the above section:

  • SYSINTERNAL SUITE
  • Hash Calculator
  • Online Sources
  • CyberChef

Domain 4: TI

  • Introduction To Threat Intelligence
  • Threat Actors
  • Types of Threat Intelligence :
    • Operational Intelligence
    • Strategical Intelligence
    • Tactical Intelligence
  • CTI Skills: NIST NICE – CTI Analyst
  • OODA Loop, Diamond Model of Intrusion Analysis
  • Unleashing Threat Intel with Maltego, AlienVault OTX
  • LOTL Based Techniques
  • Malware Campaigns & APTs

Need customized curriculum? Talk to Advisor

SOC Analyst Our Course Advisor

SOC Analyst Course Benefits

SOC Analyst Online Training Course

Here is What people are saying about InfosecTrain

Benefits You Will Access Why Infosec Train

Student-infosectrain Certified & Experienced Instructors
24x71-infosectrain Post Training Support
tailor-infosectrain Tailor Made Training
flexible-infosectrain Flexible Schedule
video1-infosectrain Access to the Recorded Sessions

SOC Analyst FAQs

1. What is a Security Operation Center (SOC)?
A Security Operations Center (SOC) is an essential component of a data protection and security system that helps lower the level of risk that information systems face from external and internal threats.
2. What steps can I take to become a SOC Analyst?
You will need a bachelor’s degree in computer science or a related discipline to become a SOC Analyst. Additionally, you must receive sufficient training from a reputable institution to obtain certification and experience to become a SOC Analyst. Each company looking to hire a SOC Analyst will have different experience requirements, so get the experience you need.
3. What skills do you need to work as a SOC Analyst?

You will require the following skills to become a SOC Analyst:

  • Programming skills
  • Understanding of cybersecurity and information security fundamentals
  • Understanding of network security
  • Incident handling and documentation
  • Ethical hacking skills
4. Is SOC a viable career option?
SOC Analyst is a job title that is held by both newcomers and seasoned professionals in the field of information security. It is a great stepping stone into a cybersecurity professional, but it is also challenging.
5. What do SOC Analysts get paid?
As per Indeed, the typical salary for a SOC Analyst in the United States is $84,601 per year.
6. What are the tools that a SOC Analyst employs?
  • Splunk
  • Security Onion
  • AlienVault
7. What is the role of a SOC Analyst?

A SOC Analyst is a member of the cybersecurity team in charge of monitoring and combating threats to a company’s IT infrastructure. They are at the forefront against security threats, and they are responsible for evaluating security systems, discovering and repairing vulnerabilities, and increasing cyber resilience.

8. What is Security Information and Event Management?
SIEM or Security Information and Event Management is a software system that collects and analyses data from a variety of sources throughout your IT infrastructure.
9. Difference between NOC and SOC?
The NOC is in charge of ensuring that corporate infrastructure can support business activities, while the SOC is in charge of safeguarding the company from cyber-attacks that could interrupt such operations.

Latest Blog Posts

TOP