Cyber Security Analyst 3 in 1

Cyber Security 1 Cyber Security 2 Cyber Security 3

Description

Cyber Security Analyst One Certificate

Complete this course with a score of 80% or higher to earn your certificate and unlock exclusive member discounts. If you're aiming for an entry-level SOC role, we strongly recommend continuing with Analyst Two, Three, and the Mentoring Program.

 

 

Cyber Security Analyst Two Certificate

Gain practical, job-ready skills across key SOC topics including Identity, NetFlow, WAF, Threat Intelligence, and Incident Response. You'll complete 14 use cases through hands-on labs in a military-grade Cyber Range, giving you real-world experience that employers value. Ideal for IT graduates and professionals transitioning into cybersecurity.

 


Cyber Security Analyst Three Certificate

This advanced course simulates the real-life challenges of working in a SOC team. Designed by globally experienced SOC architects, it offers high-level drills and training on one of the industry’s best cyber ranges. Perfect for candidates looking to stand out and prove their readiness for high-pressure SOC roles.

Certification

 

 

Prerequisites

  • CCNA or equivalent

  • Relevant IT based University Degree or Vocational Diploma

  • IT industry experience

SOC Path

The SOC is Evolving

Choose the Path that’s Right for You
  1. Self-managed SOC
    This model has an on-premises facility with in-house staff.
  2. Distributed SOC
    Or a co-managed SOC, this model has semi-dedicated full-time or part-time team members who are hired in-house to work alongside a third-party managed security service provider (MSSP).
  3. Managed SOC
    This model has MSSPs providing all SOC services to an enterprise. Managed detection and response (MDR) partners are another form of a managed SOC.
  4. Command SOC
    This model provides threat intelligence insights and security expertise to other, typically dedicated, security operations centers. A command SOC is not involved in the actual security operations or processes, just the intelligence side.
  5. Fusion Centre
    This model oversees any security-focused facility or initiative, including other types of SOCs or IT departments. Fusion centres are considered advanced SOCs and work with other enterprise teams, such as IT operations, DevOps and product development.
  6. Multifunction SOC
    This model has a dedicated facility and in-house staff, but its roles and responsibilities extend to other critical areas of IT management, such as the network operations centres (NOCs).
  7. Virtual SOC
    This model does not have a dedicated on-premises facility. A virtual SOC can be enterprise-run or fully managed. An enterprise-run SOC is generally staffed by in-house employees or a mix of in-house, on-demand and cloud-provided employees. A fully managed virtual SOC, also known as an outsourced SOC or SOC as a service (SOCaaS), has no in-house staff.
  8. SOCaaS
    This subscription-based or software-based model outsources some or all SOC functions to a cloud provider.

Target Audience

Network and Security Administrators,

Network and Security Engineers,

Network Defense Analyst,

Network Defence Technicians,

Network Security Specialist,

Network Security Operator, and any security professional handling network security operations

Cybersecurity Analyst

Entry-level cybersecurity professionals

Anyone who wants to become a SOC Analyst.

Course Outline

SOC Analyst 1

Module 1 

SIEM eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 2

SIEM Lab 1, 2 & 3.

Module 3

Firewall eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 4

Firewall Lab 1. Sun Flood Attack, 2. DDoS, 3. Packet Capture

Module 5 

IPS eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 6 

IPS Lab 1. Login Brute Force Attack, 2. External ScaN Reconnaissance, 3. Detect Wannacry Attack, 4. Mobile Malware Attack

Module 7 

Web Security eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 8 

Web Security Lab 1. Malware Detection, 2. Reputation Based Detection, 3. HTTP Response Codes.

Module 9 

Email Security eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 10 

Email Security Lab 1. Malware Detection, 2. Spam Detection, 3. Illegal Content Detection.

Module 11 

Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

Module 12 

Optional eLearning Forum.

 

SOC Analyst 2

Module 1 

 Identity eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 2

 Identity Lab 1. Brute Force, 2. Credential Stuffing, 3. Privilege Escalation

Module 3

 NetFlow eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 4

 NetFlow Lab 1. C&C, 2. External Scan Reconnaissance, 3. DLP

Module 5 

 WAF eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 6 

 WAF Lab 1. SQL Injection, 2. Cross Site Scripting.

Module 7 

 Threat Intelligence eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 8 

 Threat Intelligence Lab 1. IP Reputation, 2. Domain Reputation, 3. Hash Reputation.

Module 9 

 Incident Response eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 10 

 Incident Response Lab 1, 2 & 3.

Module 11 

 Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

Module 12 

Optional eLearning Forum.

 

SOC Analyst III puts 8 of the most in demand and cutting edge SOC Drills in your hands, they include: 

SOC Drill 1.  APT (Advanced Persistent Threats)

SOC Drill 2.  APT Attack ​

SOC Drill 3.  APT Compromise

SOC Drill 4.  APT Compromise 1.

SOC Drill 5.  APT Compromise 2.

SOC Drill 6.  APT Compromise 3.

SOC Drill 7.  Critical APT Compromise 1.

SOC Drill 8.  Critical APT Compromise 2.

Similar courses

Immerse for yourself in the World's best cyber security elearning experience!

More Information

Best Combo --- Overview, Cyber Security Analyst I, II & III, Mentorship Program & Internship Program

More Information