SOC Analyst Online Training Course Content
Introduction of Cyber security-SOC
(a) Routers
(b) Switches
Types of Network Security Devices and Working
(a) Firewalls
(b) IPS/IDS
(c) Proxy
Windows and Linux
For SOC Analyst Interview Questions Click Here
- What is Cyber security and Why to lean Cyber security
- Cyber Security Carrier path
- How to become a Cyber security Engineer
- Cyber Security Certifications
- What is SOC and a Day of SOC analyst
- What is Networking
- MAC Address & IP Address
- OSI Model and each layer explanation
- TCP IP Protocol Suite
- TCP Header
- IP header
- NAT
- PAT
- Basics of Wireshark
- What is UDP Protocol
- UDP Header and UDP header fields
- What is the ICMP Protocol
- ICMP Header and Header fields
- Common Attacks Performed with ICMP Protocol
- Protocols v/s Ports
- Basics of FTP, Telnet, SSH & SMTP
- What is ARP Protocol
- What Is HTTP & How does it works
- What is DHCP & How does it works
- What is DNS & How does it works
(a) Routers
(b) Switches
Types of Network Security Devices and Working
(a) Firewalls
(b) IPS/IDS
(c) Proxy
Windows and Linux
- Workgroup & Domain
- Windows Password
- Windows Authentication
- Linux Basics
- Windows & Linux Logs
- CIA triangle
- Vulnerability, Threat and Risk
- What is Malware and Types of Malwares
- SOC daily operation and task
- Use cases-Network monitoring
- Use cases-Windows
- Endpoint Security
- Next Generation AV and endpoint protection
- Use cases
- Carbon Black
- Crowd strike
- OWASP
- Web application Attacks
- Use cases on Web application attacks
- DDOS
- DNS amplification attack
- IP Spoofing
- MAC Spoofing…. etc.
- Cyber Kill chain
- Incident response with real world scenarios
- ATT & CK MITRE Security framework
- Introduction of Splunk and Arcsight
- Components of Splunk and Arcsight
- Splunk and Arcsight Architecture
- Basic Search Performing in Splunk
For SOC Analyst Interview Questions Click Here