Curriculum
Course:
Security Operations Center (SOC) Fundame...
Login
Curriculum
Security Operations Center (SOC) Fundamentals - From Monitoring to Mitigation
Module 1: Introduction to Security Operations
0/6
What is a Security Operations Center (SOC)?
Text lesson
Preview
SOC roles and responsibilities (Analyst tiers, Team Leads, Incident Responders)
Text lesson
Preview
SOC maturity models (Level 1 to Level 4)
Text lesson
Preview
SOC workflow: Detect → Analyze → Respond → Recover
Text lesson
Preview
Types of SOC: In-house, MSSP, Hybrid
Text lesson
Preview
Tour of a SOC environment (video-based walkthrough included in lecture recording)
Text lesson
Preview
Module 2: Core SOC Technologies and Architecture
0/6
SIEM: Purpose, components, and architecture
Text lesson
Preview
Log sources: Firewalls, endpoints, IDS/IPS, cloud services
Text lesson
Preview
Endpoint Detection and Response (EDR)
Text lesson
Preview
Threat intelligence platforms (TIPs)
Text lesson
Preview
SOAR: Automation and orchestration in SOCs
Text lesson
Preview
Data pipelines and retention policies
Text lesson
Preview
Module 3: Log Management and Event Correlation
0/5
Understanding log types: Syslog, NetFlow, Windows Event Logs, DNS logs
Text lesson
Preview
Parsing, normalization, and enrichment
Text lesson
Preview
Event correlation techniques
Text lesson
Preview
Alerting and tuning: Avoiding false positives
Text lesson
Preview
Time synchronization, log integrity, and secure storage
Text lesson
Preview
Lab 1: Log Analysis and Correlation Techniques
0/2
Objectives
Text lesson
Preview
Lab Activities
Text lesson
Module 4: Threat Detection and Investigation
0/4
MITRE ATT&CK for SOC use
Text lesson
Preview
Indicators of Compromise (IoC) vs Indicators of Attack (IoA)
Text lesson
Preview
Use case development for detection
Text lesson
Preview
Basic alert triage: Steps, priorities, and escalation
Text lesson
Preview
Case Study Assignment
0/1
Case Study Assignment
Text lesson
Preview
Module 5: Incident Response and Ticketing
0/5
The SOC playbook lifecycle
Text lesson
Preview
Phases of incident response (NIST Framework)
Text lesson
Preview
Ticketing systems and workflow management
Text lesson
Preview
Incident escalation and communication protocols
Text lesson
Preview
Retrospective: Root cause analysis and lessons learned
Text lesson
Preview
Module 6: SOC Metrics, Reporting, and Compliance
0/4
Key SOC performance indicators (MTTD, MTTR, alert-to-ticket ratio)
Text lesson
Preview
Report generation for different audiences (executive vs technical)
Text lesson
Preview
Compliance basics (SOC 2, ISO 27001, HIPAA, etc.)
Text lesson
Preview
Role of SOC in audits and internal reviews
Text lesson
Preview
Module 7: Hands-On Lab - Simulated SOC Environment
0/2
Practical 1: Log Triage and Alert Investigation
Text lesson
Preview
Practical 2: Threat Hunting Challenge
Text lesson
Preview
Module 8: Career Path and Industry Tools
0/4
Analyst levels and career roadmap (SOC Tier 1 - 3, Threat Hunter, IR Lead)
Text lesson
Preview
Overview of tools used in the field: Splunk, ELK, Wazuh, AlienVault, CrowdStrike, SentinelOne
Text lesson
Preview
Certifications to pursue: CompTIA Security+, CySA+, GCIH, GCIA, etc.
Text lesson
Preview
Building a home lab and practicing with open-source tools
Text lesson
Preview
Final Assessment
0/1
Final Assessment
Text lesson
Preview
Text lesson
Event correlation techniques
Event correlation techniques
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
Lost Password?