Certified SOC Analyst | CSA

The first steps to entering the Security Operations Center

Requirements:
  • 1 year of work experience in Network Admin / Security domain

SOC Analyst Continuously monitors and detects potential threats, triages alerts and escalates them appropriately.

Without a SOC analyst, processes such as monitoring, detection, analysis, and triage will lose their effectiveness, ultimately negatively impacting the organization.

The course is suitable for:

  • SOC Analysts

  • Cybersecurity Analyst

  • Network Defense Analyst

  • Network Defense Technician

  • Network a Security Engineer

  • Network a Security Administrator

  • Kdokoliv kdo se chce stát SOC Analytikem

What will you learn

More information
  • Gain in-demand technical skills
  • Gain knowledge about the incident response process
  • Learn to manage various SOC processes and work with the CSIRT when needed
  • Learn to plan, organize and carry out monitoring and analysis of threats in the enterprise

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 Incidents, Events, and Logging
  • Incident
  • Event
  • Log
  • Typical log sources
  • Need of log
  • Logging requirements
  • Typical Log format
10:30 – 10:45 Coffee break
10:45 – 12:15 Incidents, Events, and Logging
  • Local logging
  • Logging approaches
  • Centralized logging
12:15 – 13:15 Lunch break
13:15 – 14:45 Incident Detection with Security Information and Event Management (SIEM)
  • SIEM
  • Security anlaytics
  • Need of SIEM
  • Typical SIEM Capabilities
  • SIEM Architecture and ITS Components
  • SIEM Solutions
14:45 – 15:00 Coffee break
15:00 – 17:00 Incident Detection with Security Information and Event Management (SIEM)
  • SIEM Deployment
  • Incident Detection with SIEM
  • Examples of commonly Used Use Case Across all SIEM deployments
  • Handling Alert Triaging and Analysis

2nd Day

09:00 – 10:30 Security Operations and Management
  • SOC
  • Security Operations
  • Security Management
  • Need of SOC
10:30 – 10:45 Coffee break
10:45 – 12:15 Security Operations and Management
  • SOC Workflow
  • SOC Capabilities
  • SOC Operations
12:15 – 13:15 Lunch break
13:15 – 14:45 Understanding Cyber Threats, IoCs, and Attack Methodology
  • Cyber Threats
  • Intent - motive - goal
  • Tactics - techniques - procedures
  • Oppoturnity - vulnerability - weakness
14:45 – 15:00 Coffee break
15:00 – 17:00 Understanding Cyber Threats, IoCs, and Attack Methodology
  • Network level attacks
  • Host level attacks
  • Application level attacks
  • Email security threats
  • Understanding IoCs
  • Understanding attackers hacking methodology

3rd Day

09:00 – 10:30 Enhanced Incident Detection with Threat Intelligence
  • Understanding CTI
  • Why treat intelligence  - driven SOC
10:30 – 10:45 Coffee break
10:45 – 12:15 Incident Response
  • Incident Response Team (IRT)
  • Where Does IRTFits in the Organization
  • SOC and IRT Collaboration
  • IR process overview
12:15 – 13:15 Lunch break
13:15 – 14:45 Incident Response
  • Preparation for Incident Response
  • Incident Recording  and Assigment
  • Incident triage
  • Notification
  • Contaiment
14:45 – 15:00 Coffee break
15:00 – 17:00 Incident Response
  • Evidence gathering and Forensic Analysis
  • Eradication
  • Recovery
  • Post Incident Activities
Responding to Network Security Incidents
  • Block length 90
  • Teaching hours 24
  • Refreshments Yes
  • Exam Yes

CSA is a training and credentialing program that helps candidates gain on-demand trends and technical skills through instruction from the most experienced trainers in the industry.

Classes are taught in a virtual environment that you connect to with your own laptop. In case you don't have access, we will provide on-demand.

Prestigious certification included

Certified SOC Analyst | C|SA

After the completion of the C|SA training, candidates will be ready to attempt the Certified SOC Analyst exam. Upon successful completion of the exam, with a score of at least 70%, the candidate will be entitled to the C|SA certificate and membership privileges. Members are expected to adhere to recertification requirements through EC-Council’s Continuing Education Requirements.

Certification instructions

Exam format

After completing C|SA training, candidates will be ready to attempt the Certified SOC Analyst exam.

Duration: 3 hours

Min. success rate: 70%

Number of questions: 100

Format: Multiple Choice

Online at the EC-Council Exam Portal

Frequently asked questions

All questions

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.