Course Overview
This program prepares you for SOC Analyst Tier 1/2 roles. You'll work in simulated security environments, investigate real attack patterns, and learn the tools used in modern security operations centers.
What You'll Learn
- Security fundamentals: CIA triad, threat models, frameworks
- Networking and protocol analysis
- SIEM platforms: Splunk, ELK, Microsoft Sentinel
- Endpoint detection and response (EDR)
- Threat hunting and MITRE ATT&CK mapping
- Incident response and digital forensics basics
- Vulnerability assessment with Nessus and OpenVAS
Curriculum
Module 1 · Security Foundations (6 hrs)
- Security principles and risk
- Common attack patterns
Module 2 · Networking for Security (8 hrs)
- TCP/IP, DNS, HTTP analysis
- Wireshark and packet captures
Module 3 · SIEM & Log Analysis (10 hrs)
- Splunk SPL queries
- Detection rule writing
Module 4 · Threat Detection (8 hrs)
- MITRE ATT&CK framework
- Threat hunting workflows
Module 5 · Incident Response (8 hrs)
- IR lifecycle and playbooks
- Forensic triage
Module 6 · Vulnerability Management (5 hrs)
- Scanning and prioritization
- Patch management workflows
Module 7 · Capstone Lab (5 hrs)
- End-to-end SOC simulation
- Incident write-up and report
Upcoming Batches
Weekend BatchSat & Sun · 10:30 AM – 1:00 PM CST
Enroll
Weekday BatchMon–Fri · 7:30 – 9:30 PM CST
Enroll
FAQ
What background do I need?
Basic IT or networking knowledge is helpful. We refresh networking fundamentals early.
Will I get hands-on lab access?
Yes — cloud-based labs with simulated attacks and real SIEM tools.
Does this align to certifications?
Content overlaps with CompTIA Security+ and SOC Analyst tier-1 expectations.