Cybersecurity Essentials
Course Description
This module, Cybersecurity Essentials – SOC Basics, Network+ Review, SIEM Intro, strengthens your fundamentals in cyber defense. You’ll quickly review key Network+ concepts, understand how they apply in a Security Operations Center (SOC), and get a hands-on introduction to SIEM tools for log analysis and threat detection.
Course Outcome :
-
Develop core network defense skills.
-
Learn effective SIEM monitoring techniques.
-
Practice threat hunting using real-world scenarios.
-
Build capabilities in incident response and handling alerts.
-
Align your skills with entry-level SOC analyst role requirements.
Course Curriculum
This module, Cybersecurity Essentials – SOC Basics, Network+ Review, SIEM Intro, strengthens your fundamentals in cyber defense. You’ll quickly review key Network+ concepts, understand how they apply in a Security Operations Center (SOC), and get a hands-on introduction to SIEM tools for log analysis and threat detection.
- Cyber threat landscape and CIA triad
- Attack types: malware, phishing, ransomware
- Roles: SOC Analyst, Incident Responder
- Lab: Identify phishing and malware samples
- OSI & TCP/IP Models
- Ports, protocols, and routing basics
- Firewalls, NAT, VPNs
- Lab: Analyze traffic in Wireshark
- Windows & Linux hardening
- User privileges, logging, patching
- Lab: Configure logging and auditing policies
- Social engineering and phishing
- DoS, MITM, brute force, insider threats
- Lab: Simulate phishing and analyze response
- Access control models: MAC, DAC, RBAC
- Firewalls, IDS/IPS, Zero Trust Architecture
- Lab: Configure firewall and rule sets
- SOC functions and incident lifecycle
- Incident triage, ticketing tools
- Lab: Simulate SOC alert handling
- SIEM architecture and log correlation
- Splunk, ELK, QRadar overview
- Lab: Ingest and analyze logs with Splunk
- Detection techniques, containment and recovery
- Root cause analysis and IR best practices
- Lab: Simulate incident response in a SOC scenario
- Tools: Nessus, OpenVAS, Nmap
- Risk scoring, patch management
- Lab: Scan network and generate vulnerability report
- Cloud security shared responsibility model
- IAM policies and MFA configuration
- Lab: Secure AWS IAM roles and audit logs
- ISO 27001, NIST, GDPR fundamentals
- Risk management and security audits
- Lab: Draft security compliance policy
- Simulated SOC project: detect, analyze, respond
- Report writing and presentation
- Lab: Final SOC breach investigation