Curriculum
Course: Security Operations Center (SOC) Fundame...
Login

Curriculum

Security Operations Center (SOC) Fundamentals - From Monitoring to Mitigation

Lab 1: Log Analysis and Correlation Techniques

0/2
Text lesson

Case Study Assignment

Title: Research Assignment: Dissecting a Real-World Breach

Assignment Format:

Students will choose (or be assigned) a well-documented cybersecurity incident (e.g., SolarWinds, Target POS breach, Colonial Pipeline, Uber breach, Equifax, etc.) and prepare a 2-page technical analysis report.

Assignment Requirements

Sections to Include:

  1. Overview of the Incident
    • What happened, when, and how it was discovered
  2. Initial Attack Vector
    • Technical detail on the point of entry (e.g., phishing, supply chain, VPN, misconfiguration)
  3. MITRE ATT&CK Mapping
    • Identify techniques and tactics used (e.g., T1566.001, Spearphishing Attachment)
  4. Log Artifacts and Detection Possibilities
    • What artifacts would have appeared in a SOC (logs, alerts)?
    • How could a SIEM or EDR have detected this earlier?
  5. Response Timeline
    • How was it contained, and what were the key mistakes or wins?
  6. Lessons Learned / Prevention Steps
    • What technical controls could prevent recurrence?
    • What monitoring or alerting gaps existed?

Evaluation Focus:

  • Technical depth of research
  • Correct MITRE mappings and timeline logic
  • Ability to identify missed detection opportunities
  • Clarity and precision of written analysis