@ 2023 Cyber Dojo. All rights reserved.
Description
Curriculum
Instructor
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate effectively in a Security Operations Center (SOC). Participants will gain insights into SOC functions, tools, and processes, enabling them to detect, analyze, and respond to cyber threats. Through hands-on exercises, real-world scenarios, and expert-led discussions, students will develop the analytical mindset required for effective incident response and threat management.
-
Key Components of Security Operations Analyst:
-
SOC Fundamentals: Understanding SOC structure, roles, and responsibilities.
-
SIEM and Log Analysis: Introduction to SIEM tools and effective log searching techniques.
-
Threat Intelligence: Utilizing threat intelligence platforms for enhanced situational awareness.
-
Incident Management: Fundamentals of incident response and management systems.
-
Network Traffic Analysis: Analyzing common network services (DNS, HTTP, TLS) and identifying anomalies.
-
Endpoint Security: Configuring security logging on Windows and Linux systems and understanding endpoint attack vectors.
-
Alert Triage and Analysis: Developing skills for effective alert triage and prioritization.
-
Phishing Investigation: Identifying and analyzing phishing emails and understanding email header analysis.
-
Continuous Improvement and Automation: Strategies for optimizing SOC processes and implementing automation.
-
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Additional Labs based on TryHackMe SOC Level 1 Learning Path
- Certification Opportunity:
- You can obtain the GSOC certification validating the acquired skills and knowledge.
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 9 Sections
- 109 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform5
- Introduction to Security Operations Analyst Course1
- Chapter 1: Blue Team Tools and Operations26
- 3.1Chapter Overview2 Minutes
- 3.2Welcome to the Blue Team30 Minutes
- 3.3SOC Overview1 Hour
- 3.4Exercise 1.0: Virtual Machine Setup13 Minutes
- 3.5TryHackMe SOC Level 1 Path Intro7 Minutes
- 3.6TryHackMe Bonus Lab: Junior Security Analyst Intro27 Minutes
- 3.7Defensible Network Concepts46 Minutes
- 3.8Events, Alerts, Anomalies, and Incidents52 Minutes
- 3.9Incident Management Systems1 Hour
- 3.10Exercise 1.1: TheHive Incident Management System24 Minutes
- 3.11TryHackMe Bonus Lab: TheHive Project40 Minutes
- 3.12Threat Intelligence Platforms1 Hour
- 3.13MISP Overview10 Minutes
- 3.14Exercise 1.2: MISP Threat Intelligence Platform29 Minutes
- 3.15TryHackMe Bonus Lab: Intro to Cyber Threat Intel22 Minutes
- 3.16TryHackMe Bonus Lab: Threat Intelligence Tools1 Hour
- 3.17TryHackMe Bonus Lab: OpenCTI46 Minutes
- 3.18TryHackMe Bonus Lab: MISP19 Minutes
- 3.19TryHackMe Bonus Lab: Yara
- 3.20SIEM and Automation1 Hour
- 3.21Know Your Enemy51 Minutes
- 3.22Exercise 1.3: SIEM with the Elastic Stack45 Minutes
- 3.23TryHackMe Bonus Lab: Introduction to SIEM
- 3.24Quiz: CTI Analyst1 Day19 Questions
- 3.25TryHackMe Bonus Lab: Friday Overtime
- 3.26TryHackMe Bonus Lab: Trooper
- Chapter 2: Understanding Your Network24
- 4.1Chapter 2 Overview7 Minutes
- 4.2Network Architecture1 Hour
- 4.3Traffic Capture and Analysis41 Minutes
- 4.4Understanding DNS55 Minutes
- 4.5DNS Analysis and Attacks2 Hours
- 4.6Exercise 2.1: Exploring DNS54 Minutes
- 4.7Understanding HTTP47 Minutes
- 4.8TryHackMe Bonus Lab: Web Application Basics40 Minutes
- 4.9HTTP(S) Analysis and Attacks1 Hour
- 4.10Exercise 2.2: HTTP and HTTPS Analysis34 Minutes
- 4.11Understanding SMTP and Email47 Minutes
- 4.12Exercise 2.3: SMTP and Email Analysis1 Hour
- 4.13Additional Network Protocols54 Minutes
- 4.14TryHackMe Bonus Lab: Traffic Analysis Essentials
- 4.15TryHackMe Bonus Lab: Snort1 Hour
- 4.16TryHackMe Bonus Lab: Snort Challenge – The Basics1 Hour
- 4.17TryHackMe Bonus Lab: Snort Challenge – Live Attacks15 Minutes
- 4.18TryHackMe Bonus Lab: NetworkMiner
- 4.19TryHackMe Bonus Lab: Zeek
- 4.20TryHackMe Bonus Lab: Zeek Exercises
- 4.21TryHackMe Bonus Lab: Brim
- 4.22TryHackMe Bonus Lab: Wireshark: The Basics
- 4.23TryHackMe Bonus Lab: Wireshark: Packet Operations
- 4.24TryHackMe Bonus Lab: Wireshark: Traffic Analysis
- Chapter 3: Understanding Endpoints, Logs, and Files26
- 5.1Chapter 3 Overview8 Minutes
- 5.2Endpoint Attack Tactics2 Hours
- 5.3Endpoint Defense In Depth2 Hours
- 5.4Bonus Session: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them2 Hours
- 5.5TryHackMe Bonus Lab: OpenVAS28 Minutes
- 5.6TryHackMe Bonus Lab: Nessus38 Minutes
- 5.7How Windows Logging Works20 Minutes
- 5.8How Linux Logging Works18 Minutes
- 5.9Interpreting Important Events1 Hour
- 5.10Exercise 3.1: Interpreting Windows Logs1 Hour
- 5.11Bonus Session: Understanding Kerberos
- 5.12Log Collection, Parsing, and Normalization43 Minutes
- 5.13Exercise 3.2: Log Enrichment and Visualization28 Minutes
- 5.14File Contents and Identification37 Minutes
- 5.15Identifying and Handling Suspicious Files1 Hour
- 5.16Exercise 3.3: Malicious File Identification1 Hour
- 5.17TryHackMe Bonus Lab: Intro to Endpoint Security
- 5.18TryHackMe Bonus Lab: Core Windows Processes
- 5.19TryHackMe Bonus Lab: Sysinternals
- 5.20TryHackMe Bonus Lab: Windows Event Logs
- 5.21TryHackMe Bonus Lab: Sysmon
- 5.22TryHackMe Bonus Lab: Osquery: The Basics
- 5.23TryHackMe Bonus Lab: Wazuh
- 5.24Quiz: Endpoint Security Monitoring3 Hours16 Questions
- 5.25TryHackMe Bonus Lab: Monday Monitor
- 5.26TryHackMe Bonus Lab: Retracted
- Chapter 4: Triage and Analysis11
- 6.1Alert Triage and Prioritization
- 6.2Perception, Memory, and Investigation
- 6.3Models and Concepts for Infosec
- 6.4Exercise 4.1: Alert Triage & Prioritization
- 6.5Structure Analytical Techniques
- 6.6Analysis Questions and Tactics
- 6.7Analysis OPSEC
- 6.8Exercise 4.2: Structured Analysis Challenge
- 6.9Intrusion Discovery
- 6.10Incident Closing and Quality Review
- 6.11Exercise 4.3: Collecting and Documenting Incident Information
- Chapter 5: Continuous Improvement, Analytics, and Automation11
- 7.1Improving Life in the SOC
- 7.2Analytic Features and Enrichment
- 7.3New Analytic Design, Testing, and Sharing
- 7.4Tuning and False Positive Reduction
- 7.5Exercise 5.1: Alert Tuning
- 7.6Automation and Orchestration
- 7.7Improving Operational Efficiency and Workflow
- 7.8Exercise 5.2: Security Automation
- 7.9Containing Identified Intrusions
- 7.10Exercise 5.3: Incident Containment
- 7.11Skill and Career Development
- Final Exam0
- Project: Day in the Life of a SOC Analyst8
- 9.1Background10 Minutes
- 9.2Alert (1): Suspicious Behavior on Corporate Web Server15 Minutes
- 9.3Alert (2): Unauthorized Access and File Exfiltration15 Minutes
- 9.4Alert (3): Possible Malware on Windows Host25 Minutes
- 9.5Alert (4): Possible Malware Detected20 Minutes
- 9.6Alert (5): Phishing Email Campaign5 Minutes
- 9.7Project Rubric15 Minutes
- 9.8Project Details and Submission14 Days

Omar Zayed is a Managing Security Consultant at IBM, specializing in Security Intelligence & Operations Consulting (SIOC) domains. Leveraging his extensive hands-on expertise, he excels in SOC investigations, digital forensics and incident response (DFIR), threat hunting, and malware analysis. Alongside his technical proficiency, Omar has a solid consulting background, guiding organizations in designing and building advanced SOCs, conducting maturity and gap assessments, and developing SOC strategies and governance frameworks. His consulting efforts encompass the creation of robust SOC processes, response playbooks, detection use cases, and metrics that all aimed at synchronizing people, processes, and technology for optimal performance.
He also demonstrates expertise in developing and fine-tuning SIEM alerting capabilities, resolving complex DFIR cases, executing threat hunting activities, implementing advanced threat detection systems, and conducting adversary emulation and purple teaming exercises. His dedication to continual improvement in detection, response, and operational efficiency is evident throughout his work.
Additionally, Omar is a dedicated cybersecurity instructor and mentor. He has designed and delivered training programs for both newcomers and experienced professionals, emphasizing practical, real-world applications. His commitment to teaching and mentoring highlights his passion for advancing the field of cybersecurity and empowering individuals and organizations to excel.
Review
Cyber Defense

250 $
200 $
100% positive reviews
85 students
109 lessons
Language: English
2 quizzes
Assessments: Self
Granted Access Time: 52 weeks
Skill level Beginner
Courses you might be interested in
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...
-
97 Lessons
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
109 Lessons
Digital Forensics, Incident Response & Threat Hunting
This course will be coming soon😍😍
-
58 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Incident Handler course. This course equips participants with the essential skills and knowledge to effectively respond...
-
88 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...