--> Geeks Academy

Specializing Course - Workshop CYBERSECURITY & CLOUD
Skills for SOC Junior Analyst
REQUEST INFORMATION

Specializing Course - Workshop CYBERSECURITY & CLOUD
Skills for SOC Junior Analyst

CYBERSECURITY & CLOUD

CYBERSECURITY & CLOUD

Specializing Course - Workshop Skills for SOC Junior Analyst

Acquire the tools to tackle cyber threats by playing defense!

Specializing Course - WorkshopCYBERSECURITY & CLOUDFormula Weekend

Thanks to this workshop, you will learn how to implement effective countermeasures to protect your company's know-how and sensitive data by analyzing the tools most used by hackers.


CYBERSECURITY & CLOUD: Skills for SOC Junior Analyst

CYBERSECURITY & CLOUD

Duration: 32 hours

Job Placement

English

Where the Specializing Course - Workshop Skills for SOC Junior Analyst will take place?

City

Promotions

Scholarships

Capacity

Dubai UAE - On Demand
Al Zahra St

No promotion at the moment

Assigned

12 places available
Specializing Course - Workshop capacity: 12

Online - On Demand

No promotion at the moment

Assigned

12 places available
Specializing Course - Workshop capacity: 12

Specializing Course - Workshop Skills for SOC Junior Analyst | CYBERSECURITY & CLOUD duration Weekend

In today's highly interconnected world, cybersecurity plays a crucial role in the broader framework of business risk management. In fact, it is an area destined to acquire an increasingly important role within company processes and the world of work.

Cybersecurity experts (such as Ethical Hackers and SOC Analysts) are the leading figures in this context: by mastering the same tools used by hackers, they exploit the point of view of an attacker to deploy useful countermeasures for systems protection. These professionals, who ensure the protection of know-how and of all sensitive data, represent fundamental assets for any company.

The workshop will take place in a creative environment, with references to the typical underground "Old School" culture of hacking and within the framework of a Learning-by-Doing approach. Theory will thus be accompanied by a substantial part of hands-on practice (e.g.practical sessions of recognition and protection from hacker attacks), which will contribute to speed up and facilitate the entire learning process. Thanks to this workshop you will learn to use the leading attack analysis softwares and the tools that every SOC Analyst needs to know. You will also acquire the notions that will allow you to recognize the main intrusion techniques, up to the point of understanding what specific measures can be adopted to ensure an adequate level of system security.

MODULE 1 | Introduction to SOC Analysis

  • Introduction to SOC: you will learn what a SOC Analyst is, what it does and why its figure is so important. A division according to prior knowledge will be discussed, if necessary. National legislation in the field of IT security will also be addressed.
  • Introduction to SIEMs: you will learn what a SIEM is, which are the parts it is made up of, how the log collection works, their aggregation through rules and how to perform the tuning of the rules themselves. Examples on both proprietary and Open Source SIEM will be shown.

MODULE 2 | SOC Analysis Tools and Techniques

  • Notes on Protection Devices: introduction and notes on the main systems used for perimeter or internal security (IDS/IPS), on the operation of the main Host-Based and Network-Based software. The issues related to the difference and usefulness of each tool for the protection and integrity of systems and networks will be addressed.
  • Threat Intelligence and Hunting: the Threat Intelligence and Hunting section deals specifically with the part related to defense tools, tools available to a SOC analyst and the correlation of threats through the use of public sources and T.I. tools. Overview also on the main tools used for Threat Intelligence and malware analysis.
  • Examples of the most common alerts and their management: this section will address the main types of alerts that can usually be encountered on SIEM, their analysis and the preparation of the final report.
  • Incident Response: this section is dedicated to the main phases of the response and incidents management, with a strong focus on management, taking charge and triage from L1. L2 and L3 analysis will also be mentioned, and an example of incident reporting will be provided.
  • 8-hour practical workshop.

Request a one-on-one interview to learn more about each teaching unit.

The workshop, which takes place within the framework of a broader training program in the field of Cybersecurity, is aimed at students who have basic knowledge in the use of computers and networks, and a keen curiosity for the world of hacking and for everything related to cybersecurity.

A solid preparation that will allow you to operate in the field of Information Security with a SOC Analyst profile. You will gain practical experience on how to use the main SIEM softwares (IBM QRadar, Splunk, ELK), as well as the most popular tools used by a SOC.

Diploma & Certifications
At the end of the course, you will receive a certificate of completion “GEEKS ACADEMY DIPLOMA”, a “DIPLOMA SUPPLEMENT” and the EXIN INTERNATIONAL CERTIFICATIONS included in your study plan – if you choose to sit the exam, which is not mandatory.

Career Coaching 
For a period of 5 years after the conclusion of the course, you will have the chance to benefit from our Career Coaching service for free. 
Over 95% of our graduates have found a job within 3 months since the end of the course!

International Experiences
To our students we offer the possibility to take part in exciting study trips in Dubai, Seoul, Milan, Rome and Singapore, where the hubs of our international network are located. These immersive experiences represent a great way to enrich students’ wealth of knowledge and increase their career opportunities.

Global Alumni Community
By joining this course, you will automatically become a member of the AGA: the Alumni Geeks Academy.
AGA is the community that gathers all our former students in order to offer them support, help them strengthen and develop professional relationships, provide them with networking opportunities and notify them about the latest job offers. The Alumni International Day represents the community’s most important international networking event, as well as a valuable opportunity to keep up-to-date with the latest trends and technologies.

Smart Education Formula
Course delivery mode: synchronous distance learning.

The lessons will take place on Saturday and Sunday (10:00-13:00 and 13:45-15:45 CET).

*The hours indicated are intended as academic hours of 50 minutes each.

E-learning Platform
Our flexible approach allows you to study wherever and whenever you want, even if you work and do not have much time. 
All lessons are delivered OnlineLive by qualified teachers, and are recorded in real time to give you the opportunity to watch them asynchronously on our e-learning platform, in case you miss one lesson or you want to review some contents. Among other things, on the platform you will also find many useful materials for self-studying, such as self-assessment tests, exercises and exam simulations. 

Minimum hardware & software requirements
Notebook: 64-bit dual core on x86-64 CPU | 8GB RAM | O.S. Windows, GNU/Linux or macOS

Payment Method
Payment must be issued in one single solution before the beginning of the course.

The number of places available is limited

Please fill out the form to inquire about our services & promotions and to check the availability.

"One of the best Geeks courses, enriched also by the presence of highly qualified teachers"
(Stefano L.)

"Very prepared, competent and AVAILABLE teachers!"
(Leonardo C.)

"The SOC Analyst course of the Geeks Academy gives a comprehensive preparation about the Ethical Hacking training course. The teachers are true expertise who have succeeded in the intent to combine the wealth of information with a clear exposition full of real examples. The passion they transmit is so contagious that one would like the course to never end!"
(Fabio M.)

Request information

AND DOWNLOAD THE BROCHURE


Register with your profile:

Or fill in the fileds:

Share with:


Specializing Course - Workshop Area

CYBERSECURITY & CLOUD

CYBERSECURITY & CLOUD


By 2026, the cyber security market value will exceed $290 billion. In 2020, companies identified cyber crime as the major risk for business, while the World Economic Forum indicated it as the number 3 threat to global security. The number of profiles required will increase by 300%, due to the rise in cyber crime.

Check out also these courses of CYBERSECURITY & CLOUD

Digital training courses Geeks Academy

Blockchain: 4,9€ billion European investments by 2023

The value of the Cyber Security global market will be 300 billion in 2025.

13,4 million European Data Workers by 2028

REQUEST INFORMATION

Our Partners

powered by dunp