The SOC Analyst - Career Path syllabus includes a detailed roadmap of the carefully curated curriculum for the courses, labs, and assessments required to complete the program. This program is designed to get you learning hands-on quickly, gain practical knowledge and apply skills in practice to get you skilled up for your next career goal.

Our path includes

The new Consolidated CCNA training program that allows you to learn the latest technologies, software development skills and job roles.





Once we have got our fundamentals in place, we will look to empower you with the skills to become a SOC Analyst. Companies need skilled SOC Analysts who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.



Security Operations and



Understand the SOC Fundamentals

Discuss the Components of SOC: People, Processes

and Technology

Understand the Implementation of SOC

Understanding Cyber Threats,

IoCs, and Attack Methodology


Describe the term Cyber Threats and Attacks

Understand the Network Level Attacks

Understand the Host Level Attacks

Understand the Application Level Attacks

Understand the Indicators of Compromise (IoCs)

Discuss the Attacker’s Hacking Methodology

Incidents, Events, and Logging

Understand the Fundamentals of Incidents, Events,

and Logging

Explain the Concepts of Local Logging

Explain the Concepts of Centralized Logging

Incident Detection with

Security Information and Event

Management (SIEM)


Understand the Basic Concepts of Security

Information and Event Management (SIEM)

Discuss the Different SIEM Solutions

Understand the SIEM Deployment

Learn Different Use Case Examples for Application

Level Incident Detection

Learn Different Use Case Examples for Insider

Incident Detection

Learn Different Use Case Examples for Network Level

Incident Detection

Learn Different Use Case Examples for Host Level

Incident Detection

Learn Different Use Case Examples for Compliance

Understand the Concept of Handling Alert Triaging

and Analysis

Enhanced Incident Detection

with Threat Intelligence


Learn Fundamental Concepts on Threat Intelligence

Learn Different Types of Threat Intelligence

Understand How Threat Intelligence Strategy is


Learn Different Threat Intelligence Sources from

which Intelligence can be obtained

Learn Different Threat Intelligence Platform (TIP)

Understand the Need of Threat Intelligence-driven

Incident Response

Response Understand the Fundamental Concepts of Incident Response

Learn Various Phases in Incident Response Process

Learn How to Respond to Network Security Incidents

Learn How to Respond to Application Security


Learn How to Respond to Email Security Incidents

Learn How to Respond to Insider Incidents

Learn How to Respond to Malware Incidents




The final Course CEH will immerse you in a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. We will put you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.



Key issues plaguing the information security world, incident management process, and penetration testing

Various types of footprinting, footprinting tools, and countermeasures

Network scanning techniques and scanning countermeasures

Enumeration techniques and enumeration countermeasures


System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures


Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures


Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures


DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures


Different types of webserver attacks, attack methodology, and countermeasures


Different types of web application attacks, web application hacking methodology, and countermeasures


SQL injection attacks and injection detection tools

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures


Various cloud computing concepts, threats, attacks, and security techniques and tools


Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap


Perform vulnerability analysis to identify security loopholes in the target organization’s


network, communication infrastructure, and end systems.


Different threats to IoT platforms and learn how to defend IoT devices securely