This Career Path is for a Security Operations Center Analyst (SOC Analyst). This particular
Career Path covers a more intermediate-level SOC role. As a SOC Analyst, your primary duty is
to ensure that the organization’s digital assets are secure and protected from unauthorized
access. That means that you are responsible for protecting both online and on-premise
infrastructures, monitoring data to identify suspicious activity, and identifying and mitigating risks
before there is a breach. In the event that a breach does occur, a SOC analyst will be on the front
line, working to counter the attack. This career path is aligned to the Cyber Defense Incident
Responder NICE/NIST work role.
-
Module One
- NMAP
- Perform a Network Vulnerability Assessment Using NMAP (Lab)
- Identify Non-secure Network Traffic (Lab)
- Monitoring Network Traffic for Potential IOA/IOC (Lab)
- Centralized Monitoring (Lab)
- Splunk (Assessment)
- Creating SIEM Reports with Splunk (Lab)
- Log Analysis in Linux and Splunk (Lab)
- Windows Event Log Manipulation via Windows Event Viewer (Lab)
- Parse Files Out of Network Traffic (Lab)
- Participate in Attack Analysis Using Trusted Tool Set (Lab)
- Network Miner (Lab)
-
Module Two
-
Module Three
- Incident Response and Advanced Forensics
- Incident Response Recovery
- Computer Hacking and Forensics
- Identify Attack Types
- Identifying Malicious Network Connections
- Finding Malicious Indicators
- Investigating a Network Compromise
- Using Hash Functions to Validate Data Integrity
- Identify and Remove Trojan Using Various Tools
- Identify Rootkit and DLL Injection Activity
- Identifying Intrusion and Mitigating Attacks with RHEL Server
0.0
0 total
5
4
3
2
1