Specializing Course - Workshop Skills for SOC Junior Analyst | CYBERSECURITY & CLOUD duration Weekend
In today's highly interconnected world, cybersecurity plays a crucial role in the broader framework of business risk management. In fact, it is an area destined to acquire an increasingly important role within company processes and the world of work.
Cybersecurity experts (such as Ethical Hackers and SOC Analysts) are the leading figures in this context: by mastering the same tools used by hackers, they exploit the point of view of an attacker to deploy useful countermeasures for systems protection. These professionals, who ensure the protection of know-how and of all sensitive data, represent fundamental assets for any company.
The workshop will take place in a creative environment, with references to the typical underground "Old School" culture of hacking and within the framework of a Learning-by-Doing approach. Theory will thus be accompanied by a substantial part of hands-on practice (e.g.practical sessions of recognition and protection from hacker attacks), which will contribute to speed up and facilitate the entire learning process. Thanks to this workshop you will learn to use the leading attack analysis softwares and the tools that every SOC Analyst needs to know. You will also acquire the notions that will allow you to recognize the main intrusion techniques, up to the point of understanding what specific measures can be adopted to ensure an adequate level of system security.
Main Contents
MODULE 1 | Introduction to SOC Analysis
- Introduction to SOC: you will learn what a SOC Analyst is, what it does and why its figure is so important. A division according to prior knowledge will be discussed, if necessary. National legislation in the field of IT security will also be addressed.
- Introduction to SIEMs: you will learn what a SIEM is, which are the parts it is made up of, how the log collection works, their aggregation through rules and how to perform the tuning of the rules themselves. Examples on both proprietary and Open Source SIEM will be shown.
MODULE 2 | SOC Analysis Tools and Techniques
- Notes on Protection Devices: introduction and notes on the main systems used for perimeter or internal security (IDS/IPS), on the operation of the main Host-Based and Network-Based software. The issues related to the difference and usefulness of each tool for the protection and integrity of systems and networks will be addressed.
- Threat Intelligence and Hunting: the Threat Intelligence and Hunting section deals specifically with the part related to defense tools, tools available to a SOC analyst and the correlation of threats through the use of public sources and T.I. tools. Overview also on the main tools used for Threat Intelligence and malware analysis.
- Examples of the most common alerts and their management: this section will address the main types of alerts that can usually be encountered on SIEM, their analysis and the preparation of the final report.
- Incident Response: this section is dedicated to the main phases of the response and incidents management, with a strong focus on management, taking charge and triage from L1. L2 and L3 analysis will also be mentioned, and an example of incident reporting will be provided.
- 8-hour practical workshop.
Request a one-on-one interview to learn more about each teaching unit.
Who is this course aimed at?
The workshop, which takes place within the framework of a broader training program in the field of Cybersecurity, is aimed at students who have basic knowledge in the use of computers and networks, and a keen curiosity for the world of hacking and for everything related to cybersecurity.
What will you gain from this course?
A solid preparation that will allow you to operate in the field of Information Security with a SOC Analyst profile. You will gain practical experience on how to use the main SIEM softwares (IBM QRadar, Splunk, ELK), as well as the most popular tools used by a SOC.
Diploma & Certifications
At the end of the course, you will receive a certificate of completion “GEEKS ACADEMY DIPLOMA”, a “DIPLOMA SUPPLEMENT” and the EXIN INTERNATIONAL CERTIFICATIONS included in your study plan – if you choose to sit the exam, which is not mandatory.
Career Coaching
For a period of 5 years after the conclusion of the course, you will have the chance to benefit from our Career Coaching service for free.
Over 95% of our graduates have found a job within 3 months since the end of the course!
International Experiences
To our students we offer the possibility to take part in exciting study trips in Dubai, Seoul, Milan, Rome and Singapore, where the hubs of our international network are located. These immersive experiences represent a great way to enrich students’ wealth of knowledge and increase their career opportunities.
Global Alumni Community
By joining this course, you will automatically become a member of the AGA: the Alumni Geeks Academy.
AGA is the community that gathers all our former students in order to offer them support, help them strengthen and develop professional relationships, provide them with networking opportunities and notify them about the latest job offers. The Alumni International Day represents the community’s most important international networking event, as well as a valuable opportunity to keep up-to-date with the latest trends and technologies.
Teaching Arrangements & Technical Equipment
Smart Education Formula
Course delivery mode: synchronous distance learning.
The lessons will take place on Saturday and Sunday (10:00-13:00 and 13:45-15:45 CET).
*The hours indicated are intended as academic hours of 50 minutes each.
E-learning Platform
Our flexible approach allows you to study wherever and whenever you want, even if you work and do not have much time.
All lessons are delivered OnlineLive by qualified teachers, and are recorded in real time to give you the opportunity to watch them asynchronously on our e-learning platform, in case you miss one lesson or you want to review some contents. Among other things, on the platform you will also find many useful materials for self-studying, such as self-assessment tests, exercises and exam simulations.
Minimum hardware & software requirements
Notebook: 64-bit dual core on x86-64 CPU | 8GB RAM | O.S. Windows, GNU/Linux or macOS
Payment Method
Payment must be issued in one single solution before the beginning of the course.
The number of places available is limited
Please fill out the form to inquire about our services & promotions and to check the availability.
Reviews
"One of the best Geeks courses, enriched also by the presence of highly qualified teachers"
(Stefano L.)
"Very prepared, competent and AVAILABLE teachers!"
(Leonardo C.)
"The SOC Analyst course of the Geeks Academy gives a comprehensive preparation about the Ethical Hacking training course. The teachers are true expertise who have succeeded in the intent to combine the wealth of information with a clear exposition full of real examples. The passion they transmit is so contagious that one would like the course to never end!"
(Fabio M.)