EC Council ATC.png

Courses > CEH

Certified SOC Analyst

Version 1

  • 80% Practicals , 20 % Theory

  • Get trained under the best CSA Trainer of India, who worked as IT Security professional  in the Banking sector and IT Sector for a considerably long period of time. 


87677 66325

70459 27979

This course includes 
classroom 3.png

24 hours Instructor led Classroom training


One preparatory session for non-IT as well as IT students 


6 Months access to EC Council iLabs


Quality study material from iLabs


Mock tests till candidate clears his exam

Interested Participants

SOC Analyst (Tier I & Tier II)

Ethical Hackers

Network & Security Analyst


System Adminitrators

IT Engineers


Entry Level Cyber Security Professionals


Anyone who wants to join a Security Operations Center and work as Analyst

Learning Objective of CSA
  • Gain Knowledge of SOC processes, procedures, technologies, and workflows.

  • Gain a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber killchain, etc.

  • Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.

  • Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers, and workstations).

  • Gain knowledge of the Centralized Log Management (CLM) process.

  • Able to perform Security events and log collection, monitoring, and analysis.

  • Gain experience and extensive knowledge of Security Information and Event Management.

  • Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).

  • Understand the architecture, implementation and fine-tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).

  • Gain hands-on experience in SIEM use case development process.

  • Able to develop threat cases (correlation rules), create reports, etc.

  • Learn use cases that are widely used across the SIEM deployment.

  • Plan, organize, and perform threat monitoring and analysis in the enterprise.

  • Able to monitor emerging threat patterns and perform security threat analysis.

  • Gain hands-on experience in the alert triaging process.

  • Able to escalate incidents to appropriate teams for additional assistance.

  • Able to use a Service Desk ticketing system.

  • Able to prepare briefings and reports of analysis methodology and results.

  • Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response.

  • Able to make use of varied, disparate, constantly changing threat information.

  • Gain knowledge of Incident Response Process.

  • Gain understating of SOC and IRT collaboration for better incident response.

Course Outline
  1. Security Operations & Management

  2. Understanding Cyber Threats, IoCs, and Attack Methodology

  3. Incidents, Events, and Logging

  4. Incident Detection with Security Information and
    Event Management (SIEM)

  5. Enhanced Incident Detection with Threat

  6. Incident Response


CSA Instructor:



Director - Cyber Security

Aditya is a Cyber Security Expert, having worked with Telecom, Financial Services, for many years as Security Consultant and IT Security Manager, and having expertise in Ethical Hacking, Audit [PCI-DSS, RBI-PSS, RBI-PPI, UIDAI, BBPS, Vendor Risk Assessments etc], Wireless Security, Web Application Security, and Forensics.


He has completed Masters in Enterprise Network Security Management and a Certified Ethical Hacker (CEH-from ECCouncil, Europe), PCI-DSS Implementer (CPISI), and Certified Penetration Tester. His career span included imparting training to Security Consultants from KPMG, EY, Paladion, including CISOs, Senior Security Managers, to managing Enterprise Security, Audit & Compliance. 

Certified SOC Analyst Certification