Ever wondered what it is like to be on the front line of defense in the Cybersecurity industry? If so, you may be interested in becoming a Security Operations Center (SOC) Analyst.
SOC Analysts are highly sought-after individuals, who identify compromised machines and malicious actors. These individuals utilize defensive security skills and techniques that are commonly used in the industry, while working to mitigate any damages that may have occurred.
In this training, participants will oversee a network that is currently under attack. They will be taught various strategies to help defend against several attack scenarios. A few of the tools and technologies that participants will explore includes Security Onion, Wireshark, Splunk and Nessus. By no means is the course and its objectives all encompassing. As a participant, it is highly recommended that you perform additional research and self-study to continue and maintain your established knowledge and toolkit.
The provided content is listed below as a guide for the course and is subject to change. We appreciate your support and hope that you enjoy the training. We look forward to your participation and feedback as well.
If you have any additional questions outside of the FAQs, please do not hesitate to reach out to [email protected] and we will be happy to assist you.
The course is tailored to the four primary exam objectives for the CompTIA CySA+ Certification which are:
- Threat Management
- Vulnerability Management
- Cyber Incident Response
- Security Architecture and Tool Sets
Note: This is NOT an official CompTIA Training but preparation for real world scenarios as a cybersecurity analyst and the Cybersecurity Analyst+ certification exam. Various tools, techniques and procedures will be covered thus those listed are just examples and are not limited to only those, as material is subject to change.
Agenda – Day/Week 1
- SOC Analyst Fundamentals
- Common Services, Threats, & Attacks
- Passive Information Gathering (OSINT)
Agenda – Day/Week 2
- Wireshark Fundamentals
- Windows Active Directory
- Vulnerability Identification & Analysis
Agenda – Day/Week 3
- Active Information Gathering
- IPv6 Overview
- IDS/IPS Tools
Agenda – Day/Week 4
- Windows Forensics
- Incident Handling & Response
- Threat Hunting
Agenda – Day/Week 5
- Security Onion
- Capture The Flag (CTF)