九色视频

Security Operations Center - Foundational Analyst

About the Course

Jump to: 

Course Details

Overview

Who Should Attend

Key Benefits

Program Outline

Course Details

Course Details

Course Name: Security Operations Center - Foundational Analyst
Course Dates
February 4 - 15, 2025
May 5 - 16, 2025

Test Dates
 February 18, 2025
May 19, 2025

Duration: 9 am - 2 pm
Credit Hours: 45 hours
Location: 九色视频 Campus

Overview

Overview

This comprehensive training course prepares students for entry-level roles in a Security Operations Center (SOC). Participants will gain the skills to identify and respond to security threats in real-time, using SOC tools and techniques to monitor network traffic, detect anomalies, and analyze security incidents. Key topics include understanding SOC infrastructure, threat intelligence, event log analysis, and the use of SIEM (Security Information and Event Management) systems.

Through scenario-based training, students will learn to classify incidents, perform root-cause analysis, and respond effectively to various threat types. The course also covers report writing, escalation procedures, and collaboration with other security teams, preparing students for the dynamic, high-stakes environment of a SOC.

Who Should Attend

Who is this course for?

  • Aspiring SOC analysts and IT professionals transitioning to SOC roles.
  • Students interested in monitoring and defending systems from threats.
  • Entry-level cybersecurity professionals focusing on incident response.

Key Benefits

Key Benefits

  • Learn to detect and respond to cyber threats in real-time.
  • Hands-on experience with SIEM tools and incident analysis.
  • Gain foundational knowledge of SOC workflows and processes.
  • Prepare for certifications like CompTIA CySA+ or Splunk Core Certified User.

Program Outline

Program Outline

1. Introduction to Security Operations

  • SOC roles and responsibilities.
  • Overview of SOC tools and technologies.

2. Threat Monitoring and Detection

  • Understanding cyber threat intelligence.
  • Analyzing security logs and network traffic.

3. Incident Response

  • Fundamentals of incident detection and containment.
  • Step-by-step response workflow.

4. SIEM Platforms and Tools

  • Setting up and using SIEM tools (e.g., Splunk, QRadar).
  • Writing and analyzing security queries.

5. Reporting and Continuous Improvement

  • Creating incident reports and post-mortems.
  • Continuous improvement and threat hunting basics.