CSA | Certified SOC Analyst
The Certified SOC Analyst (CSA) program is the first step to joining a
security operations center (SOC). It is engineered for current and aspiring
Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.
Module 1: Security Operations and Management
Module 2: Understanding Cyber Threats, IoCs, and Attack Methodology
Module 3: Incidents, Events, and Logging
Module 4: Incident Detection with Security Information and Event Management (SIEM)
Module 5: Enhanced Incident Detection with Threat Intelligence
Module 6: Incident Response
About The Exam:
- Number of Questions: 100
- Test Duration: 3 Hours
- Test Format: Multiple Choice
What You Will Learn ?
- Gain Knowledge of SOC processes, procedures, technologies, and workflows.
- Gain basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, etc.
- Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
- Able to monitor and analyze logs and alerts from a variety of different technologies across
multiple platforms (IDS/IPS, end-point protection, servers and workstations).
- Gain knowledge of Centralized Log Management (CLM) process.
- Able to perform Security events and log collection, monitoring, and analysis.
- Gain experience and extensive knowledge of Security Information and Event
- Gain knowledge on administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
- Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/
- Gain hands-on experience on SIEM use case development process.
- Able to develop threat cases (correlation rules), create reports, etc.
- Learn use cases that are widely used across the SIEM deployment.
- Plan, organize, and perform threat monitoring and analysis in the enterprise.
- Able to monitor emerging threat patterns and perform security threat analysis.
- Gain hands-on experience in alert triaging process.
- Able to escalate incidents to appropriate teams for additional assistance.
- Able to use a Service Desk ticketing system.
- Able to prepare briefings and reports of analysis methodology and results.
- Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response.
- Able to make use of varied, disparate, constantly changing threat information.
- Gain knowledge of Incident Response Process.
- Gain understating of SOC and IRT collaboration for better incident response.
- Network and Security Administrators,
- Network and Security Engineers,
- Network Defense Analyst,Network
- Defense Technicians, Network
- Security Specialist, Network
- Security Operator, and any security
- professional handling network
- security operations
- SOC Analysts (Tier I and Tier II)
- Cybersecurity Analyst
- Anyone who wants to become a SOCAnalyst.
- Lectures 0
- Quizzes 0
- Duration 3 days
- Language En / Ar
- Students 0
- Assessments Yes