SOC L2

SOC Analyst - Level 2

This advanced course is designed for SOC analysts transitioning to Tier 2 and focusing on orchestrating the triage life cycle and managing escalated alerts. The curriculum builds upon the foundational knowledge of Tier 1, adding deeper insights into leadership, management of suspected incidents, and enhanced cybersecurity expertise. 

40 Hours

Cloud Environment

Instructor Led

Virtual Labs & Simulation

Participants, with Tier 1 knowledge and skill, will deepen their understanding and skills in both the administration and operations of a SOC as necessary for Tier 2 analysts. This course covers the following: 1. Advanced Triage and Incident Management: Enhance skills in alert triaging (including preliminary incident response activities) and investigation workflows, focusing on managing and resolving escalated incidents. 2. Deepening Cybersecurity Knowledge: Gain deeper insights into cybersecurity threats and defense mechanisms, emphasizing the application of the MITRE ATT&CK Matrix for identifying attack vectors and security gaps. 3. Leadership and Operational Oversight: Develop leadership abilities to guide Tier 1 activities and provide operational oversight for a professional SOC environment.
WHO IS IT FOR
IT and Cybersecurity juniors
Cybersecurity Analysts and Practitioners
Security Operations (SecOps) professionals
GOALS
Learn to orchestrate the triage life cycle effectively at a Tier 2 level, including managing escalated alerts.
Deepen understanding of the SOC activities, focusing on enhanced capabilities (i.e. cyber threat intelligence (CTI)).
Enhance strategies for efficient alert investigation and response, tailored for Tier 2 responsibilities.
Requirements
Basic knowledge in IT, including familiarity with components of IT infrastructure (i.e., networks and operating systems), IT processes and technologies.
Basic knowledge and experience in SOC infrastructures, workflows and processes.
  • Introduction to Cyber Threat Intelligence (CTI)

  • Introduction to OSINT

  • Configuring Rules for Security Alerts

  • Practicing Incident Lifecycle Management
  • MITRE ATT&CK Matrix Module 3

  • Incident Response and Digital Forensics
  • Introduction to Windows Artifacts and Windows Registry

Hands-on CTF exercise focused on investigation of incidents

26 Hours of hands-on activities

Total amount of practical experience during this course.

Contact Us