Certified SOC Analyst (CSA)
The Cyberverse SOC Analyst program is a job-oriented industry certification with focus on using Threat Intelligence for detecting attacks and conducting Root Cause Analysis.
Learn everything to get started as a SOC Analyst.
- Monitor computer networks for security issues.
- Investigate security breaches and other cyber security incidents.
- Operate tools and software to protect systems and information infrastructure, including firewalls and data encryption programs.
- Document security breaches and assess the damage they cause.
- Work with security team to perform tests and uncover network vulnerabilities.
- Fix detected vulnerabilities to maintain a high-security standard.
- Stay current on IT security trends and news.
- Develop company-wide best practices for IT security.
- Perform penetration testing.
- Research security enhancements and make recommendations to management.
- Stay up-to-date on information technology trends and security standards.
- Security Researchers
- Students and Professionals keen on Forensics Investigations
- Security Teams
- Law Enforcement Agencies
- Military and police personnel
Rs. 90,000 + GST
Rs 25,000+ GST (only for certification)
Certified SOC Analyst
- Availabiliy : Monthly
- Progression : Pro Level 3
The Cyberverse Advantange
Instructor-led live
online sessions
30-days access
to Virtual Labs
Access to e-learning videos
Cadet level profile in the National Security Database
Clean Exit Professional Ethics Certification
Certification upon course completion
NSD empanelment and
Researcher ID card
BROWSE OUR PLANS
Select a plan which best suits you and earn your Certification
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
Our Batches
You will get weekly assignments and research work to enhance your course understanding.
Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center
Program Modules
Modern Security Architecture Principles
- Emerging attack trends
- Understanding Modern SOC Architecture
- Roles and responsibilities in SOC
Defensible Network Security Architecture Principles Applied
- Risk of unmapped, unmonitored network
- Establishing baselines for normal activities
- Key principles of network defense architecture
Network Security Monitoring
- Collection of Data
- Generating statistical data from existing data
- Detection mechanism, Indicators of compromise & Signatures
 Endpoint Security Architecture
- Strategy for implementing EDR
- Detecting Incidents in SOC
- Searching across endpoints for IOCs
- Hands-on EDR
Automation and Continuous Security Monitoring
- Various pillars of continuous monitoring
- Continuous integration
- Continuous monitoring
 Hands on: Detecting Malware via Windows Event Logs
- Malware infection
- Detecting malware via event logs
- Analysis and Reporting
Hands-on Case Studies and Practical session
- Hands-on activity using virtual labs
Triaging & Analysis
- High volume alerts and prioritizing for security
- Triaging techniques
- Validating data and submitting analysis for investigation
Practical Threat Hunting
- Pursuing abnormal activity on servers & end-points
- Hand-on activity of threat hunting
- Detecting unknown attacks – approaches
SOC Components – SIEM, Threat Intelligence, SOAR, EDR, UEBA
- Various components of modern SOC
- Understanding SOAR
- Uses of UEBA
- Effectively building and using Threat Intelligence
People Process & Technology
- Various bottlenecks in SOC Operations
- People & process issues
- Technology and implementation challenges
SOC – Daily Operations & Management
- Daily SOC Operations – best practices
- Common mistakes to avoid
- Real world case studies
Program Modules
Module 1 – Modern Security Architecture Principles
- Emerging attack trends
- Understanding Modern SOC Architecture
- Roles and responsibilities in SOC
Module 2 – Defensible Network Security Architecture Principles Applied
- Risk of unmapped, unmonitored network
- Establishing baselines for normal activities
- Key principles of network defense architecture
Module 3 – Network Security Monitoring
- Collection of Data
- Generating statistical data from existing data
- Detection mechanism, Indicators of compromise & Signatures
Module 4 – Endpoint Security Architecture
- Strategy for implementing EDR
- Detecting Incidents in SOC
- Searching across endpoints for IOCs
- Hands-on EDR
Module 5 – Automation and Continuous Security Monitoring
- Various pillars of continuous monitoring
- Continuous integration
- Continuous monitoring
Module 6 – Hands on: Detecting Malware via Windows Event Logs
- Malware infection
- Detecting malware via event logs
- Analysis and Reporting
Module 7 – Hands-on Case Studies and Practical session
- Hands-on activity using virtual labs
Module 8 – Triaging & Analysis
- High volume alerts and prioritizing for security
- Triaging techniques
- Validating data and submitting analysis for investigation
Module 9 – Practical Threat Hunting
- Pursuing abnormal activity on servers & end-points
- Hand-on activity of threat hunting
- Detecting unknown attacks – approaches
Module 10 – SOC Components – SIEM, Threat Intelligence, SOAR, EDR, UEBA
- Various components of modern SOC
- Understanding SOAR
- Uses of UEBA
- Effectively building and using Threat Intelligence
Module 11 – People Process & Technology
- Various bottlenecks in SOC Operations
- People & process issues
- Technology and implementation challenges
Module 12 – SOC – Daily Operations & Management
- Daily SOC Operations – best practices
- Common mistakes to avoid
- Real world case studies