
Courses > CEH
Certified SOC Analyst
Version 1
-
80% Practicals , 20 % Theory
-
Get trained under the best CSA Trainer of India, who worked as IT Security professional in the Banking sector and IT Sector for a considerably long period of time.
Contact
87677 66325
70459 27979
This course includes

24 hours Instructor led Classroom training

One preparatory session for non-IT as well as IT students

6 Months access to EC Council iLabs

Quality study material from iLabs

Mock tests till candidate clears his exam






Interested Participants
SOC Analyst (Tier I & Tier II)
Ethical Hackers
Network & Security Analyst
Auditors
System Adminitrators
IT Engineers

Entry Level Cyber Security Professionals

Anyone who wants to join a Security Operations Center and work as Analyst
Learning Objective of CSA
-
Gain Knowledge of SOC processes, procedures, technologies, and workflows.
-
Gain a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber killchain, etc.
-
Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
-
Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers, and workstations).
-
Gain knowledge of the Centralized Log Management (CLM) process.
-
Able to perform Security events and log collection, monitoring, and analysis.
-
Gain experience and extensive knowledge of Security Information and Event Management.
-
Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
-
Understand the architecture, implementation and fine-tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
-
Gain hands-on experience in SIEM use case development process.
-
Able to develop threat cases (correlation rules), create reports, etc.
-
Learn use cases that are widely used across the SIEM deployment.
-
Plan, organize, and perform threat monitoring and analysis in the enterprise.
-
Able to monitor emerging threat patterns and perform security threat analysis.
-
Gain hands-on experience in the alert triaging process.
-
Able to escalate incidents to appropriate teams for additional assistance.
-
Able to use a Service Desk ticketing system.
-
Able to prepare briefings and reports of analysis methodology and results.
-
Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response.
-
Able to make use of varied, disparate, constantly changing threat information.
-
Gain knowledge of Incident Response Process.
-
Gain understating of SOC and IRT collaboration for better incident response.


Course Outline
-
Security Operations & Management
-
Understanding Cyber Threats, IoCs, and Attack Methodology
-
Incidents, Events, and Logging
-
Incident Detection with Security Information and
Event Management (SIEM) -
Enhanced Incident Detection with Threat
Intelligence -
Incident Response
Certified SOC Analyst Certification
