The SOC Analyst - Career Path syllabus includes a detailed roadmap of the carefully curated curriculum for the courses, labs, and assessments required to complete the program. This program is designed to get you learning hands-on quickly, gain practical knowledge and apply skills in practice to get you skilled up for your next career goal.

Our path includes

The new Consolidated CCNA training program that allows you to learn the latest technologies, software development skills and job roles.

 

 

 

 

Once we have got our fundamentals in place, we will look to empower you with the skills to become a SOC Analyst. Companies need skilled SOC Analysts who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.

 

 

Security Operations and

Management

 

Understand the SOC Fundamentals

Discuss the Components of SOC: People, Processes

and Technology

Understand the Implementation of SOC

Understanding Cyber Threats,

IoCs, and Attack Methodology

 

Describe the term Cyber Threats and Attacks

Understand the Network Level Attacks

Understand the Host Level Attacks

Understand the Application Level Attacks

Understand the Indicators of Compromise (IoCs)

Discuss the Attacker’s Hacking Methodology

Incidents, Events, and Logging

Understand the Fundamentals of Incidents, Events,

and Logging

Explain the Concepts of Local Logging

Explain the Concepts of Centralized Logging

Incident Detection with

Security Information and Event

Management (SIEM)

 

Understand the Basic Concepts of Security

Information and Event Management (SIEM)

Discuss the Different SIEM Solutions

Understand the SIEM Deployment

Learn Different Use Case Examples for Application

Level Incident Detection

Learn Different Use Case Examples for Insider

Incident Detection

Learn Different Use Case Examples for Network Level

Incident Detection

Learn Different Use Case Examples for Host Level

Incident Detection

Learn Different Use Case Examples for Compliance

Understand the Concept of Handling Alert Triaging

and Analysis

Enhanced Incident Detection

with Threat Intelligence

 

Learn Fundamental Concepts on Threat Intelligence

Learn Different Types of Threat Intelligence

Understand How Threat Intelligence Strategy is

Developed

Learn Different Threat Intelligence Sources from

which Intelligence can be obtained

Learn Different Threat Intelligence Platform (TIP)

Understand the Need of Threat Intelligence-driven

Incident Response

Response Understand the Fundamental Concepts of Incident Response

Learn Various Phases in Incident Response Process

Learn How to Respond to Network Security Incidents

Learn How to Respond to Application Security

Incidents

Learn How to Respond to Email Security Incidents

Learn How to Respond to Insider Incidents

Learn How to Respond to Malware Incidents

 

 

 

The final Course CEH will immerse you in a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. We will put you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.

 

 


Key issues plaguing the information security world, incident management process, and penetration testing

Various types of footprinting, footprinting tools, and countermeasures

Network scanning techniques and scanning countermeasures

Enumeration techniques and enumeration countermeasures

•  

System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures

• 

Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

• 

Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures

•   

DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures

•   

Different types of webserver attacks, attack methodology, and countermeasures

•   

Different types of web application attacks, web application hacking methodology, and countermeasures

• 

SQL injection attacks and injection detection tools

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures

• 

Various cloud computing concepts, threats, attacks, and security techniques and tools

• 

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

•  

Perform vulnerability analysis to identify security loopholes in the target organization’s

•  

network, communication infrastructure, and end systems.

•  

Different threats to IoT platforms and learn how to defend IoT devices securely