Curriculum
9 Sections
87 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
5
1.1
About Cyber Dojo
1.2
How to book your live sessions
5 Minutes
1.3
Session Booking Panel
1.4
Student Panel
1.5
Join Our Channels
Introduction to Security Operations Analyst Course
1
2.1
Course Overview
6 Minutes
Chapter 1: Blue Team Tools and Operations
24
3.1
Chapter Overview
2 Minutes
3.2
Welcome to the Blue Team
30 Minutes
3.3
SOC Overview
1 Hour
3.4
Exercise 1.0: Virtual Machine Setup
13 Minutes
3.5
Defensible Network Concepts
46 Minutes
3.6
Events, Alerts, Anomalies, and Incidents
52 Minutes
3.7
Incident Management Systems
1 Hour
3.8
Exercise 1.1: TheHive Incident Management System
24 Minutes
3.9
TryHackMe Bonus Lab: TheHive Project
3.10
Threat Intelligence Platforms
1 Hour
3.11
MISP Overview
10 Minutes
3.12
Exercise 1.2: MISP Threat Intelligence Platform
29 Minutes
3.13
TryHackMe Bonus Lab: Intro to Cyber Threat Intel
3.14
TryHackMe Bonus Lab: Threat Intelligence Tools
3.15
TryHackMe Bonus Lab: MISP
3.16
TryHackMe Bonus Lab: OpenCTI
3.17
TryHackMe Bonus Lab: Yara
3.18
SIEM and Automation
1 Hour
3.19
Know Your Enemy
51 Minutes
3.20
Exercise 1.3: SIEM with the Elastic Stack
45 Minutes
3.21
TryHackMe Bonus Lab: Introduction to SIEM
3.22
Quiz: CTI Analyst
1 Day
19 Questions
3.23
TryHackMe Bonus Lab: Friday Overtime
3.24
TryHackMe Bonus Lab: Trooper
Chapter 2: Understanding Your Network
13
4.1
Chapter 2 Overview
7 Minutes
4.2
Network Architecture
1 Hour
4.3
Traffic Capture and Analysis
41 Minutes
4.4
Understanding DNS
55 Minutes
4.5
DNS Analysis and Attacks
2 Hours
4.6
Exercise 2.1: Exploring DNS
54 Minutes
4.7
Understanding HTTP
47 Minutes
4.8
TryHackMe Bonus Lab: Web Application Basics
40 Minutes
4.9
HTTP(S) Analysis and Attacks
1 Hour
4.10
Exercise 2.2: HTTP and HTTPS Analysis
34 Minutes
4.11
Understanding SMTP and Email
47 Minutes
4.12
Exercise 2.3: SMTP and Email Analysis
1 Hour
4.13
Additional Network Protocols
54 Minutes
Chapter 3: Understanding Endpoints, Logs, and Files
16
5.1
Chapter 3 Overview
8 Minutes
5.2
Endpoint Attack Tactics
2 Hours
5.3
Endpoint Defense In Depth
2 Hours
5.4
Bonus Session: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them
2 Hours
5.5
TryHackMe Bonus Lab: OpenVAS
28 Minutes
5.6
TryHackMe Bonus Lab: Nessus
38 Minutes
5.7
How Windows Logging Works
20 Minutes
5.8
How Linux Logging Works
18 Minutes
5.9
Interpreting Important Events
5.10
Exercise 3.1: Interpreting Windows Logs
5.11
Understanding Kerberos
5.12
Log Collection, Parsing, and Normalization
5.13
Exercise 3.2: Log Enrichment and Visualization
5.14
File Contents and Identification
5.15
Identifying and Handling Suspicious Files
5.16
Exercise 3.3: Malicious File Identification
Chapter 4: Triage and Analysis
11
6.1
Alert Triage and Prioritization
6.2
Perception, Memory, and Investigation
6.3
Models and Concepts for Infosec
6.4
Exercise 4.1: Alert Triage & Prioritization
6.5
Structure Analytical Techniques
6.6
Analysis Questions and Tactics
6.7
Analysis OPSEC
6.8
Exercise 4.2: Structured Analysis Challenge
6.9
Intrusion Discovery
6.10
Incident Closing and Quality Review
6.11
Exercise 4.3: Collecting and Documenting Incident Information
Chapter 5: Continuous Improvement, Analytics, and Automation
11
7.1
Improving Life in the SOC
7.2
Analytic Features and Enrichment
7.3
New Analytic Design, Testing, and Sharing
7.4
Tuning and False Positive Reduction
7.5
Exercise 5.1: Alert Tuning
7.6
Automation and Orchestration
7.7
Improving Operational Efficiency and Workflow
7.8
Exercise 5.2: Security Automation
7.9
Containing Identified Intrusions
7.10
Exercise 5.3: Incident Containment
7.11
Skill and Career Development
Final Exam
0
Project: Day in the Life of a SOC Analyst
8
9.1
Background
10 Minutes
9.2
Alert (1): Suspicious Behavior on Corporate Web Server
15 Minutes
9.3
Alert (2): Unauthorized Access and File Exfiltration
15 Minutes
9.4
Alert (3): Possible Malware on Windows Host
25 Minutes
9.5
Alert (4): Possible Malware Detected
20 Minutes
9.6
Alert (5): Phishing Email Campaign
5 Minutes
9.7
Project Rubric
15 Minutes
9.8
Project Details and Submission
14 Days
Security Operations Analyst
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content