This SOC Analyst training course is designed to be hands-on, lab-driven, and industry-aligned. It provides students with real-world SOC experience, ensuring they can step into a SOC role with practical skills in SIEM, threat detection, incident response, and compliance auditing.
Course Overview
Course Title:
Security Operations Center (SOC) Analyst Training
Duration:
8 Weeks (Hands-on Practical Training and Assessments)
Delivery Mode:
Instructor-led training
Hands-on lab-based exercises
Live simulations
Assessments and final certification project
Target Audience:
Aspiring SOC Analysts
IT Professionals transitioning into cybersecurity
Network administrators and IT support staff
Security professionals looking to enhance incident response skills
Learning Outcomes:
By the end of the course, students will be able to:
Set up and operate a SOC using Microsoft Sentinel, Defender XDR, and other security tools
Perform threat hunting, log analysis, and incident response
Understand compliance requirements (ISO 27001, GDPR, Cyber Essentials)
Conduct malware analysis, phishing investigations, and forensic analysis
Deploy and configure security controls following Zero Trust and IAM principles
Set up SIEM (Security Information and Event Management) for real-world scenarios
2. Course Breakdown by Weeks
Week 1: SOC Fundamentals & Security Tools
Objective: Understand SOC operations, key concepts, and set up security tools.
Introduction to SOC, Security Operations, and Analyst Roles
Cyber Kill Chain and MITRE ATT&CK Framework
Set up Microsoft 365 & Assign Licenses
Deploy Microsoft Sentinel & configure data connectors
Deploy Windows 365 Cloud PCs for SOC testing
Assessment: Short quiz on SOC fundamentals and initial lab setup
Week 2: Access Management & Zero Trust
Objective: Implement security policies and access control.
Role-Based Access Control (RBAC) and Identity Management
Conditional Access Policies & Multi-Factor Authentication (MFA)
Microsoft Intune: Device security and compliance
Cloudflare Zero Trust: Securing access to corporate resources
Lab: Configure Conditional Access, RBAC policies, and deploy Cloudflare Zero Trust.
Assessment: Review of access policies and security hardening
Week 3: Vulnerability Management & Threat Intelligence
Objective: Deploy and manage a vulnerability scanning program and integrate threat intelligence.
Vulnerability Management Overview and CVSS Scoring
Deploy Qualys Agent for vulnerability scanning
Analyze Qualys Findings & Prioritization
Threat Intelligence Overview: MITRE ATT&CK, MISP
Integrate Threat Intelligence into Microsoft Sentinel
Lab:
Deploy Qualys in a lab environment and analyze scan results
Integrate Threat Intelligence feeds into SIEM
Assessment: Report on vulnerability findings and risk mitigation plan
Week 4: Threat Detection & Log Analysis
Objective: Detect security incidents using log analysis and advanced SIEM techniques.Introduction to Threat Detection & IOC (Indicators of Compromise) Hunting
Microsoft Defender XDR: Endpoint Detection and Response (EDR)
Write KQL Queries for SIEM log analysis
Create Detection Rules & Alerts in Microsoft Sentinel
Investigate Alerts in Sentinel and Defender XDR
Lab:
Use KQL queries to detect suspicious activity
Correlate logs from different sources (Defender, Sentinel, Qualys)
Assessment: SIEM investigation exercise
Week 5: Incident Response & Forensics
Objective: Handle security incidents and analyze digital forensic artifacts.
Live Cyber Attack Simulation (Recon & Endpoint Compromise)
Introduction to Digital Forensics (Disk & Memory Analysis)
Use Autopsy & Volatility for memory analysis
Perform a Mock SOC Incident Handling Exercise
Lab:
Investigate a simulated attack scenario and identify compromised systems
Conduct disk and memory forensics on a breached system
Assessment: Investigative report on a security incident
Week 6: Compliance Audits & SOC Reporting
Objective: Learn security compliance frameworks and auditing techniques.
Introduction to ISO 27001, GDPR, Cyber Essentials compliance
Perform a Cyber Essentials Audit
Learn GDPR Compliance Requirements & SOC Responsibilities
Conduct an ISO 27001-2022 Audit using Microsoft Compliance Manager
Understand SOC Metrics & Reporting (MTTD, MTTR, SIEM Dashboards)
Lab:
Audit a security environment based on Cyber Essentials & GDPR standards
Configure Microsoft Compliance Manager to generate reportsAssessment: Compliance audit report
Week 7: Lab Setup & Configuration
Objective: Students build their own SOC environment and test configurations.
Deploy Microsoft Sentinel, Defender XDR, and configure log ingestion
Set up custom detection rules, dashboards, and alerts
Tune SIEM correlation rules for false positive reduction
Lab:
Full SOC setup and fine-tuning of security monitoring
Assessment: Instructor review of SOC lab setup
Week 8: Audit, Incident Response, and Mock Testing
Objective: Conduct a full SOC audit and respond to simulated attacks.
Perform a SOC audit to ensure compliance and security best practices
Phishing Incident Response: Investigate email security breaches
Malware Investigation: Analyze an endpoint malware infection
Final Security Incident Handling Report
Lab:
Conduct a full SOC investigation of a phishing attack
Simulate and analyze malware execution logs and response
Assessment: Final security report on phishing and malware attack response
3. Lab Setup Requirements
Cloud-based Lab Infrastructure:
Microsoft 365 with Azure AD, Intune, and Compliance Manager
Microsoft Defender XDR (Endpoint, Email, Identity)
Microsoft Sentinel SIEM with Log Analytics
Qualys Cloud Platform for vulnerability management
Cloudflare Zero Trust for network security
Tools & Resources:
Windows 365 Cloud PCs for each student
Autopsy & Volatility for forensic analysisKQL for SIEM log analysis
AlienVault OTX, MISP for Threat Intelligence
4. Assessment and Certification
Assessment Criteria:
Weekly quizzes and lab exercises (30%)
Practical SOC audit and incident response (40%)
Final project: Phishing and Malware Incident Response Report (30%)
Certification Requirements:
Completion of all lab exercises and SOC setup
Passing final assessment (minimum 70%)
Submission of a detailed SOC Investigation Report