SOC Analyst Course (Defensive)

Cybersecurity • Networking • SIEM • Investigation

  • What is Cybersecurity
  • Difference between Offensive and Defensive Security
  • Difference between Ethical Hacking and Cybersecurity
  • Importance of Cybersecurity for Organizations
  • Career Opportunities in Cybersecurity
  • Various Domains in Cybersecurity
  • Salaries and Growth in Cybersecurity

  • What is Networking
  • Types of Networks
  • How Communication Happens over Networks
  • OSI Model – Deep Understanding
  • TCP/IP Model
  • IP Addressing (IPv4 & IPv6)
  • Static vs Dynamic IP
  • Subnetting
  • MAC Address
  • Network Topologies & Types
  • Router, Switch, Hub, Bridge
  • DNS – Deep Understanding
  • Ports & Their Usage
  • Protocols Overview
  • Encryption & Decryption Concepts
  • How DHCP Works
  • What is NAT & PAT
  • TCP 3-Way Handshake

  • CIA Triad
  • Cyber Kill Chain
  • Incident Response Plan
  • Attack Types & Patterns
  • Ethical Hacking Steps

  • Website Architecture
  • How SSL & TLS Work
  • HTTP Error Response Codes
  • How DNS Works over the Web
  • Deep Understanding of OWASP Top 10 Vulnerabilities

  • Windows Security
  • Active Directory
  • WAF (Web Application Firewall)
  • IDS / IPS
  • Antivirus & Endpoint Protection
  • Firewalls
  • Proxy & VPN
  • Cloud Security Devices
  • Linux Servers
  • MFA Devices
  • Load Balancers

  • What is SOC
  • What is SIEM
  • Use of SIEM Tools
  • Popular SIEM Tools in the Market
  • SIEM Functions
  • SIEM Architecture
  • How Logs Flow to SIEM Tools

  • MITRE ATT&CK Framework
  • Practical Investigation of Security Device Logs
  • In-depth Investigation using AI Tools

  • Strategies to Get Multiple Interview Calls
  • Optimizing Your Resume for Cybersecurity Roles
  • Building a Professional Network
  • Interview Preparation Tips