We may earn an affiliate commission when you visit our partners.
Course image
Raghavendra Boya

Cyber Security SOC analyst training Splunk (SIEM) For those who are aspiring to certify themselves as well as enhance their knowledge and skills on becoming a SOC analyst. This course is specially designed for all level of interested candidates who wants get in to SOC.

Work of a SOC analyst?

Read more

Cyber Security SOC analyst training Splunk (SIEM) For those who are aspiring to certify themselves as well as enhance their knowledge and skills on becoming a SOC analyst. This course is specially designed for all level of interested candidates who wants get in to SOC.

Work of a SOC analyst?

A Security Operation Center Analyst is primarily responsible for all activities that occur within the SOC. Analysts in Security Operations work with Security Engineers and SOC Managers to give situational awareness via detection, containment, and remediation of IT threats. With the increment in cyber threats and hacks, businesses are becoming more vulnerable to threats. This has significantly enhanced the importance of a SOC Analyst. For those in cybersecurity, it can be a dynamic role. SOC Analysts cooperate with other team members to detect and respond to information security incidents, develop and follow security events such as alerts, and engage in security investigations.Furthermore, SOC Analysts analyze and react to undisclosed hardware and software vulnerabilities. They also examine reports on security issues and act as ‘security advisors’ for an organization.

This course helps you to learn and implement those strategies and with  training provided. This will in turn help you play a significant role in defending against cyber threats and keeping sensitive information secure.

Enroll now

What's inside

Learning objective

Student will gain the knowledge of networking, cyber security and soc analyst role activities content with hands on practicals

Syllabus

Course Introduction

In this video you will be briefly get to know about the concepts you are going to learn.

In this section you will learn some importent networking concepts
Read more
Introduction to organization Network
Introduction to web technology
ISO Model - Application and Presentation Layer Basics
ISO Model - Session, Transport, Network and DataLink Layer Basics
ISO Model Recap AND Public/Private Address Range
Understanding HTTP protocol Part 1
Understanding HTTP Part 2 and Understanding Service Ports Part 1
Understanding SMB, SMTP, Telnet, SSH, FTP, SMTP, MySql Services.
Introduction to Windows - Types of Wiondows OS and Permissions
Windows OS - Computer Management, Utilities
Indept on Port Numbers - Part 1
Indept on Port Numbers - Part 2
In this section studnet will learn all the necessary Cyber Security skills that requred for SOC analyst
Introduction to Security CIA Encryption and Hashing
Defence InDeapth Approach
Cyber Kill chain OR Phases of Attack.mp4
Brute Force Attack and Types
Phishing and Spoofing Attacks
OWASP Top 10
DNS Tunneling Attack
Malware and its Types
In this section you learn about splunk tool and also understand the SIEM use realated aspects
Splunk installation
Splunk Universal Farward Installation
Introduction to Splunk
SOC Process
SOC Roles and Responsabilities
SIEM Architecture
In this section student will learn various Log source data for better writing the queries and also for though understanding of investigation
Uploading Demo Logs to Splunk and firewall Log analysis
Understanding Firewall Logs
Splunk Dashboard creation - Firewall Part 1
Splunk Dashboard creation - Firewall Part 2
IDS Log Analysis
DNS Profiling Scenarios Part 1
DNS Profiling Scenarios Part 2
Understanding DNS Logs
Understanding HTTP Logs Part 1
Understanding HTTP Logs Part 2
Understanding Antivirus Logs
Understanding Windows Log
Understanding Windows Event IDs
Windows Sysmon Log Analysis
In this section we will discuss various SIEM scenarios and create some queries in splunk for the same scenarios
SIEM Use cases Part 1
SIEM Use cases Part 2
SIEM Use cases Part 3
Malware outbreak Analysis
Incident Handling stages
Introduction to threat Hunting
Threat Hunting - Scanning attack on Web Server
hreat Hunting - Brute Force Attack
Email Header Analysis
This is must read content in the course

In this section you will learn interview questions of networking related concepts

what is P address and IP address classification?
What is NAT and PAT?
Tell me few port numbers which you know?
How a Firewall Works?
How VPN works?
What is Symmetric and Asymmetric Encryption?
Explain CIA triad?
What is the difference in between SSL and HTTPS?
How do you stay up to date on Cyber Security news and latest attacks
What is the difference between Virus and Warm?
Explain SQL Injection Attack
What is botnet?
What is Brute Force Attack?
SIEM related interview topics
SIEM Interview Questions and Answers
SIEM Dashboard and Use cases
What are different event logs you analyze?
Student will learn answers for the questions related to SOC process and incident Handling
What is Security Operation Center?
What are various Security Devices used in your orrganization?
How does a SOC Team manage or work in an Organization?
What are the Roles and Responsibilities of SOC Engineer?
What are the fields in Sample Incident Ticket - ServiceNow ?
what are Service level Agreements for the SOC Incidents?
What is False Positive Analysis? or what are various outcomes of Analysis?
How many Logs sources are there in your organization?
What are the steps in Incident Response Life Cycle
Can you please explain what you will do after getting an alert? (Alert IR FLow)
How will you manage work in shifts?
SIEM Alert Analysis Interview Questions
How do you handle P1, P2, P3 and P4 Incidents?
what will you do if receive a Malware Attack Alert?
How do you analyze if receive a Brute Force Attack Alert?
How do you analyze Phishing email attack?
How do you Analyze SQL Injection attack?
How do you analyze DDOS Attack?
How do you analyze if a suspicious IP detected in outbound traffic?
Discussion on Real Time Activities
Course wrapup
Course Wrapup

Save this course

Save Cyber Security SOC Analyst Training - SIEM (Splunk) to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Cyber Security SOC Analyst Training - SIEM (Splunk). These are activities you can do either before, during, or after a course.

Career center

Learners who complete Cyber Security SOC Analyst Training - SIEM (Splunk) will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.
This handbook provides a comprehensive overview of the SOC Analyst role, including the skills, knowledge, and tools necessary to succeed in this field.
This cookbook provides practical guidance on how to build and operate a world-class SOC.
This guide provides detailed instructions on how to conduct incident response and threat hunting investigations.
Explores the use of big data, machine learning, and AI in SOC operations.
This handbook provides a comprehensive overview of cybersecurity operations, including the role of the SOC Analyst.
This guide provides a practical overview of the SOC Analyst role, with a focus on cyber threat detection and incident response.
This guide provides hands-on instruction on how to conduct penetration testing, which valuable skill for SOC Analysts to have.
Provides a detailed guide to SIEM design and implementation. It covers everything from planning and design to deployment and operation. It is written by a recognized expert in the field.
Provides a collection of recipes for common SIEM tasks. It covers a wide range of topics, including data collection, analysis, and reporting. It is written by an experienced SIEM professional.
Provides a collection of best practices for SIEM implementation and operation. It covers a wide range of topics, including data collection, analysis, and reporting. It is written by an experienced SIEM professional.
Comprehensive guide to using the Splunk platform for developers. It covers APIs, SDKs, and best practices for building Splunk-based applications.
Provides a detailed overview of the cyber threat landscape, including trends, threats, and mitigation strategies. It covers a wide range of topics, from cyber espionage and cyber warfare to critical infrastructure protection and cybercrime. It also provides insights into the motivations and tactics of cyber attackers.
Examines the political and policy challenges posed by cyber threats. It covers a wide range of topics, from the role of the state in cyber security to the impact of cyber threats on international relations. It also provides case studies of how different countries have responded to cyber threats.
Provides a practical guide to cyber security risk assessment. It covers a wide range of topics, from risk identification and analysis to risk mitigation and management. It also provides guidance on how to develop a cyber security risk assessment plan and process.
Provides a comprehensive overview of cyber security law and policy. It covers a wide range of topics, from data privacy and intellectual property to cybercrime and national security. It also provides guidance on how to comply with cyber security laws and regulations.
Provides a practical guide to penetration testing with Go. It covers a wide range of topics, from reconnaissance and scanning to exploitation and reporting. It also provides guidance on how to develop penetration testing tools and techniques.
Provides a comprehensive guide to penetration testing. It covers a wide range of topics, from reconnaissance and scanning to exploitation and reporting. It also provides guidance on how to develop penetration testing tools and techniques.
Provides a comprehensive guide to Metasploit, a popular penetration testing framework. It covers a wide range of topics, from installation and configuration to using Metasploit modules and techniques. It also provides guidance on how to develop Metasploit modules and plugins.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser