Apr 10 - Apr 14
10:30 AM to 01:30PM EST
It Includes
- 5 Days training program
- Live Virtual Training
- Learn on any PC/Mobile/Tablet
- Unlimited Doubt Sessions
- Online Labs (if applicable)
- Official Courseware & Kits
- Get Recording after session
- Get Certificate of Completion
- Mock Tests & Exam Preps
- Classroom Training (Optional)
Training 2 or more people?
Get a custom quote for group training, Onsite & classroom options.
Request a QuoteCourse Overview
COURSE OBJECTIVE
SOC Analysts play a crucial position in today’s security teams since they are on the front lines of cyber defense, identifying and responding to cyber threats as they occur.
The InfosecTrain’s SOC Analyst training course is specifically created for aspiring and current SOC Analysts who want to learn how to prevent, identify, assess, and respond to cybersecurity threats and incidents. The course is the first level of a course series that includes Level 1-SOC Analyst and Level 2-SOC Specialist, and is specifically designed to assist you in mastering over trending and in-demand technical abilities to carry out numerous sophisticated SOC activities.
The course begins with the fundamentals of SOC teams and Blue Team operation architecture before moving on to more advanced topics such as digital forensics, incident response, threat intelligence, and SIEM (Security Incident and Event Management) solutions.
This training course also helps participants plan their preparation for the SOC Analyst certification examinations, which are required to obtain the most sought-after position in the SOC team.
Who Should Attend?
- Technical Support Engineers
- System Administrators
- Security Consultants
- Cyber Security Analysts
- Security System Engineers
- SOC Analysts (L1 & L2)
- Information Security Researcher
Pre-requisites
- Prior knowledge of networking fundamentals, OS basics, troubleshooting is recommended
- Experience as an entry-level SOC Analyst, Cyber Security Analyst, Information Security role
- Experience of two years in the Information Security domain
- Security+ or CEH Certification Experience Equivalent
Benefits
- Gain Knowledge of SOC processes, procedures, technologies, and workflows.
- Gain a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber killchain, etc.
- Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
- Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers, and workstations).
- Gain knowledge of the Centralized Log Management (CLM) process.
- Able to perform Security events and log collection, monitoring, and analysis.
- Gain experience and extensive knowledge of Security Information and Event Management.
- Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
- Understand the architecture, implementation and fine-tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
- Gain hands-on experience in SIEM use case development process.
- Able to develop threat cases (correlation rules), create reports, etc.
- Learn use cases that are widely used across the SIEM deployment.
- Plan, organize, and perform threat monitoring and analysis in the enterprise.
- Able to monitor emerging threat patterns and perform security threat analysis.
- Gain hands-on experience in the alert triaging process.
- Able to escalate incidents to appropriate teams for additional assistance.
- Able to use a Service Desk ticketing system.
- Able to prepare briefings and reports of analysis methodology and results.
- Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response.
- Able to make use of varied, disparate, constantly changing threat information.
- Gain knowledge of Incident Response Process.
- Gain understating of SOC and IRT collaboration for better incident response.
Course Outline
-
Domain 1: Blue Team Operations Architecture
- Building a successful SOC
- Functions of SOC
- SOC Models & Types
- SOC Teams & Roles
- Heart of SOC- SIEM
- Gartner’s magic quadrant – TOP SIEM
- SIEM guidelines and architecture
-
Domain 2: SOC Tools
Splunk:
- Building a successful SOC
- Functions of SOC
- SOC Models & Types
- SOC Teams & Roles
- Heart of SOC- SIEM
- Gartner’s magic quadrant – TOP SIEM
- SIEM guidelines and architecture
Security Onion:
- Introduction to Security Onion : NSM
- Security Onion Architecture
- Walkthrough to Analyst Tools
- Alert Triage and Detection
- Hunt with Onion
-
Domain 3: DFIR
Fundamentals of Digital Forensics
- Forensics Fundamentals
- Introduction to Digital Forensics
- Hard Drive Basics
- SSD Drive Basics
- File Systems
- Metadata & File Carving
- Memory, Page File, and Hibernation File
- Order of Volatility
- Evidence Forms
- Volatile Evidence
- Disk Evidence
- Network Evidence
- Web & Cloud Evidence
- Evidence Forms
- Chain of Custody
- What is the Chain of Custody?
- Why is it Important?
- Guide for Following the Chain of Custody
- Windows Investigations
- Artifacts
- Equipment
- Live Forensics
- Live Acquisition
- Products
- Potential Consequences
- Post-Investigation
- Report Writing
- Evidence Retention
- Evidence Destruction
- Further Reading
-
Tools exposure provided in the above section:
- Command-LINE for Windows / Linux
- Network Analysis: Wireshark, Network Miner
- Disk Based Forensics: FTK IMAGER, AUTOPSY, Encase
- Memory Forensics: MAGNATE & BELKASOFT RAM CAPTURE, DumpIt, Volatility, Volatility WorkBench
- Email Forensics: Manual & Automated Analysis
-
Incident Response Basics
- Introduction to Incident Response
- What is an Incident Response?
- Why is IR Needed?
- Security Events vs. Security Incidents
- Incident Response Lifecycle – NIST SP 800 61r2
- Incident Response Plan : Preparation, Detection & Analysis, Containment, Eradication, Recovery, Lessons Learned
- Case Study : Cyber Kill Chain in Incident Response
- Lockheed Martin Cyber Kill Chain
- MITRE ATT&CK Framework
- Preparation
- Incident Response Plans, Policies, and Procedures
- The Need for an IR Team
- Asset Inventory and Risk Assessment to Identify High-Value Assets
- DMZ and Honeypots
- Host Defences
- Network Defences
- Email Defences
- Physical Defences
- Human Defences
-
Detection and Analysis
- Common Events and Incidents
- Establishing Baselines and Behavior Profiles
- Central Logging (SIEM Aggregation)
- Analysis (SIEM Correlation)
-
Containment, Eradication, Recovery
- CSIRT and CERT Explained
- Containment Measures
- Taking Forensic Images of Affected Hosts
- Identifying and Removing Malicious Artefacts
- Identifying Root Cause and Recovery Measures
-
Tools exposure provided in the above section:
- SYSINTERNAL SUITE
- Hash Calculator
- Online Sources
- CyberChef
-
Domain 4: TI
- Introduction To Threat Intelligence
- Threat Actors
- CTI Skills: NIST NICE – CTI Analyst
- OODA Loop, Diamond Model of Intrusion Analysis
- Unleashing Threat Intel with Maltego, AlienVault OTX
- LOTL Based Techniques
- Malware Campaigns & APTs
Vendor

Frequently Asked Questions
-
What does a SOC analyst do?
SOC analysts use their networking, computer science, research and collaboration skills to assess security systems for vulnerabilities and malicious activities and to identify potential controls to mitigate them. SOC analysts can also be expected to perform many other tasks: Monitor security systems for suspicious network or application behavior Document security incidents and implement response plans Assist with cybersecurity risk assessments, vulnerability testing and compliance activities Monitor and perform security and patch management -
How do I become a SOC analyst?
To help the creation of your development plan, the Bureau of Labor Statistics (BLS) notes that successful SOC analysts typically display the following characteristics: Analytical skills: SOC analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved Detail-oriented: Because cyberattacks can be difficult to detect, SOC analysts must pay careful attention to computer systems and watch for minor changes in performance Ingenuity: SOC analysts must anticipate SOC risks and implement new ways to protect their organization’s computer systems and networks Problem-solving skills: SOC analysts must respond to security alerts, uncover and fix flaws in computer systems and networks -
What education does a SOC analyst need?
Most SOC analyst vacancies are looking for candidates with a bachelor’s degree in computer science, information assurance or a related field. However, given the large critical skills gap across the cybersecurity industry, many employers’ emphasis on four-year degrees has lessened if the candidate can show tangible technical skills, and related on-the-job experience. -
What certifications does a SOC analyst need?
There is no industry-wide or CompTIA SOC analyst certification path, or certified SOC analyst training program available right now. But several related programs cover many of the relevant skills an analyst would need, regardless of the industry in which they would be employed. One example is CompTIA’s intermediate-level Cybersecurity Analyst (CySA+) certification, or CompTIA’s Security+ and Network+ certifications. There are other certifications one could use to improve their skills and validate their understanding of important security fundamentals: Certified Ethical Hacker (CEH) Certified Penetration Tester (CPT) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Offensive Security Certified Professional -
What skills does a SOC analyst need?
SOC analyst day-to-day activities require them to demonstrate competency across the following security domains: Network defense Ethical hacking Incident response Computer forensics Reverse engineering -
What does a SOC analyst work?
One source lists New Jersey, Delaware, New York, Massachusetts and Maryland as the top employer of security analysts. Given the size of the federal government, Virginia and the District of Columbia can also be expected to employ a lot of SOC analysts. -
How does Live Training works?
Live training, also known as online training, is a method of delivering training in real-time over the internet. The trainer and the trainees are connected through video conferencing software, allowing for interactive communication and collaboration. During live training, the trainer can present materials, lead discussions, answer questions, and engage with the trainees in real-time. -
Does Learnfly offer Classroom & Onsite training as well?
Yes. We Do! We do offer classroom, onsite, group sessions & 1 on 1 training for selective courses. Contact our support team and our team will assist you with the process. -
Do you provide certification and exam assistance?
Yes! We provide assistance in scheduling & preparing for your exam after a successful training completion. Once you successfully pass your exam, you will be awarded with a certification. -
What if I miss my scheduled class or want to reschedule?
No worries. You can simply request for the next date as per your availability. -
Can I change the trainer if not satisfied?
We only provide highly qualified and certified trainers with 100% satisfaction rate. However, if you are not satisfied with the trainer, you can request for a free replacement. -
Do I get a lab access with the course?
Yes! If your training require a lab access, then it will be included in the price. -
Is Learnfly accredited?
Yes! Learnfly is accredited with many renowned vendors like Microsoft, ISACA, VMWare, PECB, EC Council. Cisco and many more. -
Are Learnfly Instructor's Certified?
Yes. We only provide training via Certified Instructors. -
Where is Learnfly Located?
Learnfly is a global training provider with locations in India, United States, United Kingdom, UAE, Australia & Africa. -
Does Learnfly offer after training support?
Yes. We offer 1 month free support after your training completion for any queries related to your course, examination etc. -
What is Learnfly Platform?
Learnfly Platform is an omnnichannel Learning Management System that allows you to access thousands of self paced courses, attend live classes, track certifications, access interactive quizzes & assignments, Online labs, connect with Instructors & do much more. Join the platform to know more. -
Do you offer a demo live session with an instructor?
Yes! If you need a demo session to get a feel of live training or to evaluate an instructor, then you can request for a 15 minutes free live session. Connect with our training team for more info. -
Can I get a refund if not satisfied?
All of our training comes with 30 days money back guarantee. Refunds are only applicable on instructor training. Exam, labs are non-refundable. -
How can I make a payment for my training?
We accept all major payment methods like debit/credit card, PayPal and Bank Wire transfer. For bank transfer, please contact us at support@learnfly.com -
How can i get started?
Super! Simply click on "Book Now" button on this page to reserve your seat and make a payment. You can choose from available schedules or provide your own. For anything else like quotation, purchase order, bank wire details etc, please contact our training team at support@learnfly.com. See you learning with us soon!
Certification Partners
Meet our official certification partners. Get Certified with internationally recognised names.
Earn International recognition and certification
Earn International recognition and certification
Get Certified : Get Ahead
Get your own personalized Certificate of Completion, once you successfully complete the training with Learnfly. Showcase your certifcation on Linkedin & more.

250k+ Students and growing.
Listen what they say about Learnfly Courses

I enrolled in ECIH course from Learnfly. This platform enabled me to learn difficult concepts with ease and that too at my own pace. I completed the course in a comfortable environment and would surely recommend Learnfly for this IT course that is well in demand.
Helen Thorogood,
- Student -

I enrolled in Machine Learning course from Learnfly. It was a good learning experience and I learnt the concepts well through the video lectures. The videos were well designed and helped me follow a step-by-step approach to complete my course. I recommend Learnfly for this course.
Elanie Mitchell,
- Student -

I was thrilled to pursue Artificial Intelligence course. It is in high demand. I started searching for a good online platform and luckily found Learnfly. I was initially skeptical about it but later found that it was good. My course was completed in a hassle-free manner. Kudos to Learnfly!
Ailsa Thomas,
- Student -

I pursued CEH from Learnfly. I easily understood the stuff as it was imparted in a fresh manner through well-structured video lectures. All the topics were covered in the videos and I could access them as per my requirements at different points of time. I recommend Learnfly platform to save both your time and money.
Pulkit Reddy,
- Student -

There is high demand for Artificial Intelligence course in the job market these days. I chose Learnfly to pursue this course. The video lectures were designed in a learner-friendly way and it was really convenient for me to understand the concepts well in a short span of time invested.
Raghavendran Burman,
- Student -

Machine Learning is a course that is in demand these days. I was not interested to pursue it through classroom lecture mode. I searched for few platforms offering this course online but finally opted for Learnfly. It trained me for the technology and I am now able to gain a better position in my company after learning at my own and attaining the certificate.