SOC L1
SOC Analyst - Level 1
Training of a Basic Level Monitoring Team – Analyst Level 1
40Hours
Cloud Environment
Instructor Led
Virtual Labs & Simulation

The primary purpose of this course is to equip entry-level SOC analysts with the knowledge and skills necessary for effective triage of security alerts, encompassing both the administrative and operational activities handled by Tier 1 analysts.
WHO IS IT FOR
IT & Cybersecurity Juniors
Cybersecurity Analysts
& Pracititionerss
SecOps Professionals
STEM Students (Year 3+)
GOALS
Learn the fundamentals of triage, including alert management and incident escalation in a SOC environment.
Acquire knowledge of basic principles specific to SOC operations.
Provide the foundations for future advanced training, emphasizing incident handline and response process, and digital forensics.
Understanding roles & responsibilities: Insights will be provided for both administrative and operational activities that SOC analysts (Tier 1) are expected to encounter.
Experiencing Practical Triaging of Security Alerts: A key objective of the course is to develop participants' understanding of the triage life cycle. Participants will learn to distinguish between false positives and true positives, ensuring appropriate actions (i.e. escalation).

Requirements
Basic knowledge in IT, including familiarity with components of IT infrastructure
Basic experience with IT processes and technologies

- Operating Systems Basics
- Windows Operating Systems
- Enrichment on File systems
- Introduction to Linux
- Introduction to Networking
- Networks and OSI model
- The MITRE ATT&CK Matrix (Theory and Use Case Practice )
- The Security Operation Center
- The Technological Building Blocks of SOCs
- Lifecycle of Cybersecurity Incidents
- Logs and Events
- Security Events SIEM Rules
- Embedded in earlier topics
18+ Hours of hands-on activities
Total amount of practical experience during this course.