SOC Analyst Prep Workshop

Security Operations Center (SOC) Analyst Prep Workshop

Through real-world, hands-on instruction, and with a focus on network defense, we provide a path to a successful career as a Security Operations Center (SOC) Analyst. #SOCAnalystPrep.

Have you ever wondered what it’s like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.

SOC Analysts are highly sought-after individuals who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry, while working to mitigate any damages that may have occurred.

In this workshop, participants will oversee a network that is currently under attack. They will be taught various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore include Security Onion, Wireshark, Splunk, and Nessus. By no means is the course and its objectives all-encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.  

The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well. 

If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you.

Course Outline

The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:

  1. Threat Management
  2. Vulnerability Management
  3. Cyber Incident Response
  4. Security Architecture and Tool Sets 

Note: This is NOT an official CompTIA training course but rather preparation for real scenarios you may encounter as a cybersecurity analyst or during the CySA+ exam. Various tools, techniques and procedures will be covered, thus those listed are just examples and are not limited to only those, as material is subject to change.

Agenda – Day 1

  • SOC Analyst Fundamentals
  • Common Services, Threats, & Attacks
  • Passive Information Gathering (OSINT)

Agenda – Day 2

  • Wireshark For Defenders
  • Active Information Gathering
  • IPv6 Overview
  • Vulnerability Identification & Analysis

Agenda – Day 3

  • IDS/IPS Tools
  • Threat Hunting w/ Security Onion
  • Intro To Snort Rule Management

Agenda – Day 4

  • Incident Handling & Response
  • Windows Forensics
  • Intro to Web App Testing

Agenda – Day 5

  • Intro to Splunk
  • Blue Team Capture The Flag (CTF)
About the Instructor(s)
Video References
Over 31 thousand views!

YouTube's #1 SOC Analyst Video

Frequently Asked Questions (FAQ's)
  • Knowledge of operating systems along with ports and protocols are very helpful.
  • Materials to Read Ahead: It is HIGHLY RECOMMENDED that you read the background information provided in this link to have a successful Cover6 Solutions training experience –
  • For the optimal workshop experience, we suggest the following:
    • Processor – 64-bit i5 or higher
    • RAM – 8 GB or higher
    • Memory – 40 GB or higher
    • Operating System – please use whatever OS you are comfortable with
  • Every Tuesday & Thursday from 6:00 PM to 9:00 PM Eastern..
  • Yes, all sessions are recorded and placed on the website for easy access.
  • Yes, but in a good way that will grow your skills. We recommend coming with a VERY open mind to the material and other participants so that the learning experience is a positive and enjoyable one. We encourage questions and getting to know other professionals who are also enrolled in the training.
  • Yes. 12 CEUs are available for this course.
  • Yes. Additionally, all alumni receive a 10% discount on a future course after completion of their first Cover6 training.
  • As always, it is up to you to “get” the job. However, Cover6 Solutions has built a platform that will assist you with very viable knowledge that can be used on the job. In addition, we can assist you with resume services to showcase and enhance your newly acquired skills.
  • Absolutely! Our relationship does not end with this training. All alumni are treated like family and we will do all we can to ensure you become a successful security professional.
  • A survey will be sent out during and after the training for you to provide your questions, comments, and concerns. You can always leave/find reviews at the following locations: