Skip to main content

Cybersecurity Training in SOC for Cybersecurity

$299.00
Who trusts this:
Trusted by professionals in 160+ countries
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Your guarantee:
30-day money-back guarantee — no questions asked
Adding to cart… The item has been added

This curriculum spans the design and operation of a full-scale Security Operations Center, comparable in scope to multi-phase advisory engagements that establish 24/7 monitoring, integrate threat intelligence, configure SIEM and EDR systems, automate response workflows, and implement continuous improvement programs across people, processes, and technology.

Module 1: SOC Architecture and Operational Design

  • Selecting between centralized, distributed, and hybrid SOC models based on organizational footprint and threat exposure.
  • Defining escalation paths and shift handover procedures to ensure continuity during 24/7 monitoring operations.
  • Integrating physical and logical access controls for SOC workstations and investigation terminals.
  • Designing network segmentation to isolate SOC tools, analysts, and management functions from production environments.
  • Establishing secure remote access protocols for off-site SOC personnel with multi-factor authentication and session logging.
  • Implementing role-based access control (RBAC) to restrict analyst permissions based on job function and data sensitivity.
  • Choosing between on-premises, cloud-hosted, or managed SOC tooling based on data residency and compliance requirements.
  • Documenting and version-controlling SOC runbooks to support consistent incident response and onboarding.

Module 2: Threat Intelligence Integration and Management

  • Evaluating commercial, open-source, and ISAC-provided threat intelligence feeds for relevance and reliability.
  • Mapping threat intelligence to MITRE ATT&CK techniques and aligning detection rules accordingly.
  • Automating IOC ingestion into SIEM and EDR platforms using STIX/TAXII protocols with validation checks.
  • Establishing feedback loops to enrich threat intelligence with internal telemetry and incident findings.
  • Assigning ownership for threat actor profiling and tracking campaign evolution across multiple incidents.
  • Implementing false positive reduction mechanisms for high-volume IOCs to avoid alert fatigue.
  • Classifying intelligence by confidence, relevance, and timeliness to prioritize operational use.
  • Managing expiration and deprecation of threat indicators to maintain data hygiene in detection systems.

Module 4: SIEM Configuration and Log Management

  • Defining log retention policies based on regulatory requirements, forensic needs, and storage costs.
  • Normalizing and parsing heterogeneous log sources to ensure consistent field mapping and correlation accuracy.
  • Tuning correlation rules to reduce false positives while maintaining detection coverage for critical threats.
  • Validating log source connectivity and completeness using heartbeat monitoring and log coverage dashboards.
  • Implementing parsing overrides and custom parsers for non-standard application logs.
  • Managing parser performance to prevent SIEM resource exhaustion during peak ingestion periods.
  • Establishing data tiering strategies (hot/warm/cold) to balance query performance and storage expenses.
  • Enforcing encryption and access logging for archived logs to meet audit requirements.

Module 5: Endpoint Detection and Response (EDR) Operations

  • Configuring EDR agents to balance telemetry depth with system performance impact on endpoints.
  • Defining containment policies for automated response actions, including isolation and process termination.
  • Validating EDR coverage across server, desktop, and cloud workloads with automated compliance checks.
  • Managing false positive triage for behavioral detections using analyst feedback loops.
  • Conducting live forensic collection via EDR consoles during active incident investigations.
  • Integrating EDR alerts into SIEM for centralized correlation with network and identity events.
  • Rotating and securing EDR console credentials and API keys with privileged access management tools.
  • Testing EDR detection rules against adversary simulation exercises to validate efficacy.

Module 6: Network Monitoring and Traffic Analysis

  • Deploying network taps and SPAN ports to ensure complete visibility into critical segments.
  • Configuring full packet capture systems with retention policies aligned to incident response needs.
  • Using NetFlow and metadata analysis to detect lateral movement and data exfiltration patterns.
  • Integrating IDS/IPS alerts with SIEM and ticketing systems using standardized event formats.
  • Filtering and prioritizing network alerts based on asset criticality and threat severity.
  • Conducting baseline analysis of normal network behavior to improve anomaly detection accuracy.
  • Managing decryption of TLS traffic for inspection while complying with privacy regulations.
  • Responding to encrypted C2 traffic by correlating DNS requests and beaconing patterns.

Module 7: Incident Triage, Investigation, and Response

  • Standardizing initial triage procedures using a decision matrix based on impact and confidence.
  • Assigning incident ownership and severity levels using a consistent classification framework.
  • Executing containment actions with documented approval workflows to prevent unauthorized disruption.
  • Preserving forensic artifacts before system remediation or re-imaging.
  • Coordinating cross-team response activities with IT, legal, and communications stakeholders.
  • Using timeline analysis to reconstruct attacker activities across multiple systems and time zones.
  • Documenting investigation findings in structured reports for executive and technical audiences.
  • Conducting post-incident reviews to update detection rules and response playbooks.

Module 8: SOC Automation and Orchestration (SOAR)

  • Selecting use cases for automation based on volume, repetitiveness, and risk of manual error.
  • Developing playbooks that include conditional logic, human-in-the-loop approvals, and error handling.
  • Integrating SOAR with ticketing, email, and collaboration platforms for seamless workflow handoffs.
  • Testing automated actions in a staging environment before production deployment.
  • Monitoring playbook execution logs to detect failures and performance degradation.
  • Managing API rate limits and authentication tokens across integrated security tools.
  • Version-controlling SOAR playbooks and tracking changes through configuration management.
  • Measuring automation effectiveness using metrics such as mean time to acknowledge and containment.

Module 9: SOC Performance Metrics and Continuous Improvement

  • Defining KPIs such as mean time to detect (MTTD), mean time to respond (MTTR), and alert backlog.
  • Conducting quarterly maturity assessments using frameworks like NIST or CIS.
  • Performing tabletop exercises to validate incident response readiness and identify gaps.
  • Tracking analyst workload and alert volume to prevent burnout and maintain response quality.
  • Reviewing false positive and false negative rates to guide detection engineering efforts.
  • Updating detection rules and playbooks based on threat landscape changes and internal incidents.
  • Conducting peer reviews of escalated cases to ensure consistency and quality of analysis.
  • Reporting metrics to executive leadership with context on risk reduction and operational efficiency.