Security Operations Center (SOC) Training & Practice Program
An Opportunity not to be Missed
What is the Purpose of This Program?
Security Operations Center (SOC) Training & Practice Program is designed to provide training and practice opportunities to any individual who has a basic level of understanding of Cyber Security and Networking. Participants will be using real SOC tools like Splunk, IBM QRadar, Falcon Crowdstrike, Jira, and Wireshark.
Who Should Attend This Program?
If you have a fundamental grasp of Cyber Security and Networking but lack hands-on experience, this program is an excellent fit for you. Not only will you receive comprehensive training sessions, but you will also actively participate in real SOC shifts under the guidance of Cydeo Mentors.
What Makes This Program Special?
The Security Operations Center (SOC) Training & Practice Program stands out from typical online courses available in the market. By enrolling in this program, you will gain access to genuine SOC tools currently utilized by SOC teams worldwide. Analyzing actual malicious attacks, interpreting various types of logs, investigating the latest real-world vulnerabilities, and regularly generating reports or tickets to simulate a 24/7 SOC environment are opportunities you won’t find elsewhere. This is what makes this program exceptional; it is dedicated to equipping you with all the essential skills required for a successful career as a SOC Analyst.
SOC Training & Practice Program
Start Date: April 29th, 2024
End Date: May 24th, 2024
Program Tuition: $999
What do we cover ?
IBM QRadar Security Information and Event Management(SIEM)
JIRA Ticket Management Tool
Falcon Crowdstrike EDR Tool
Network Analysis with Wireshark
Phishing Email Analysis
Security Operations Center structure and Processes
HTML Basics
UI, API, DB and HTTP Protocol Fundamentals
Splunk Search & Reporting Application
Syslog, ModSecurity, Authentication, Access Log Analysis
What is Cydeo Security Operations Center?
The Cydeo Security Operations Center (SOC) is a platform that offers participants the opportunity to gain real-life experience by functioning as an L1 or Tier 1 Security Analyst. This role involves investigating offenses, events, incidents, or any malicious activities and responding to the situation either by creating a ticket or escalating the issue to Subject Matter Experts (SMEs).
Participants delve into the details of offenses from IBM QRadar or incidents from Falcon Crowdstrike EDR through searches using queries on Splunk and various web platforms. Jira serves as the primary tool for managing Cyber Security events and tickets. Daily handover meetings, stand-up and sit-down briefings are conducted during shifts to ensure effective coordination and communication. Additional investigation tools are integrated to support in-depth analysis of malicious activities, vulnerability assessments, and network traffic.
Register here to watch our SOC Intro Session: