Curriculum
9 Sections
109 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
5
1.1
About Cyber Dojo
1.2
How to book your live sessions
5 Minutes
1.3
Session Booking Panel
1.4
Student Panel
1.5
Join Our Channels
Introduction to Security Operations Analyst Course
1
2.1
Course Overview
6 Minutes
Chapter 1: Blue Team Tools and Operations
26
3.1
Chapter Overview
2 Minutes
3.2
Welcome to the Blue Team
30 Minutes
3.3
SOC Overview
1 Hour
3.4
Exercise 1.0: Virtual Machine Setup
13 Minutes
3.5
TryHackMe SOC Level 1 Path Intro
7 Minutes
3.6
TryHackMe Bonus Lab: Junior Security Analyst Intro
27 Minutes
3.7
Defensible Network Concepts
46 Minutes
3.8
Events, Alerts, Anomalies, and Incidents
52 Minutes
3.9
Incident Management Systems
1 Hour
3.10
Exercise 1.1: TheHive Incident Management System
24 Minutes
3.11
TryHackMe Bonus Lab: TheHive Project
40 Minutes
3.12
Threat Intelligence Platforms
1 Hour
3.13
MISP Overview
10 Minutes
3.14
Exercise 1.2: MISP Threat Intelligence Platform
29 Minutes
3.15
TryHackMe Bonus Lab: Intro to Cyber Threat Intel
22 Minutes
3.16
TryHackMe Bonus Lab: Threat Intelligence Tools
1 Hour
3.17
TryHackMe Bonus Lab: OpenCTI
46 Minutes
3.18
TryHackMe Bonus Lab: MISP
19 Minutes
3.19
TryHackMe Bonus Lab: Yara
3.20
SIEM and Automation
1 Hour
3.21
Know Your Enemy
51 Minutes
3.22
Exercise 1.3: SIEM with the Elastic Stack
45 Minutes
3.23
TryHackMe Bonus Lab: Introduction to SIEM
3.24
Quiz: CTI Analyst
1 Day
19 Questions
3.25
TryHackMe Bonus Lab: Friday Overtime
3.26
TryHackMe Bonus Lab: Trooper
Chapter 2: Understanding Your Network
24
4.1
Chapter 2 Overview
7 Minutes
4.2
Network Architecture
1 Hour
4.3
Traffic Capture and Analysis
41 Minutes
4.4
Understanding DNS
55 Minutes
4.5
DNS Analysis and Attacks
2 Hours
4.6
Exercise 2.1: Exploring DNS
54 Minutes
4.7
Understanding HTTP
47 Minutes
4.8
TryHackMe Bonus Lab: Web Application Basics
40 Minutes
4.9
HTTP(S) Analysis and Attacks
1 Hour
4.10
Exercise 2.2: HTTP and HTTPS Analysis
34 Minutes
4.11
Understanding SMTP and Email
47 Minutes
4.12
Exercise 2.3: SMTP and Email Analysis
1 Hour
4.13
Additional Network Protocols
54 Minutes
4.14
TryHackMe Bonus Lab: Traffic Analysis Essentials
4.15
TryHackMe Bonus Lab: Snort
1 Hour
4.16
TryHackMe Bonus Lab: Snort Challenge – The Basics
1 Hour
4.17
TryHackMe Bonus Lab: Snort Challenge – Live Attacks
15 Minutes
4.18
TryHackMe Bonus Lab: NetworkMiner
4.19
TryHackMe Bonus Lab: Zeek
4.20
TryHackMe Bonus Lab: Zeek Exercises
4.21
TryHackMe Bonus Lab: Brim
4.22
TryHackMe Bonus Lab: Wireshark: The Basics
4.23
TryHackMe Bonus Lab: Wireshark: Packet Operations
4.24
TryHackMe Bonus Lab: Wireshark: Traffic Analysis
Chapter 3: Understanding Endpoints, Logs, and Files
26
5.1
Chapter 3 Overview
8 Minutes
5.2
Endpoint Attack Tactics
2 Hours
5.3
Endpoint Defense In Depth
2 Hours
5.4
Bonus Session: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them
2 Hours
5.5
TryHackMe Bonus Lab: OpenVAS
28 Minutes
5.6
TryHackMe Bonus Lab: Nessus
38 Minutes
5.7
How Windows Logging Works
20 Minutes
5.8
How Linux Logging Works
18 Minutes
5.9
Interpreting Important Events
1 Hour
5.10
Exercise 3.1: Interpreting Windows Logs
1 Hour
5.11
Bonus Session: Understanding Kerberos
5.12
Log Collection, Parsing, and Normalization
43 Minutes
5.13
Exercise 3.2: Log Enrichment and Visualization
28 Minutes
5.14
File Contents and Identification
37 Minutes
5.15
Identifying and Handling Suspicious Files
1 Hour
5.16
Exercise 3.3: Malicious File Identification
1 Hour
5.17
TryHackMe Bonus Lab: Intro to Endpoint Security
5.18
TryHackMe Bonus Lab: Core Windows Processes
5.19
TryHackMe Bonus Lab: Sysinternals
5.20
TryHackMe Bonus Lab: Windows Event Logs
5.21
TryHackMe Bonus Lab: Sysmon
5.22
TryHackMe Bonus Lab: Osquery: The Basics
5.23
TryHackMe Bonus Lab: Wazuh
5.24
Quiz: Endpoint Security Monitoring
3 Hours
16 Questions
5.25
TryHackMe Bonus Lab: Monday Monitor
5.26
TryHackMe Bonus Lab: Retracted
Chapter 4: Triage and Analysis
11
6.1
Alert Triage and Prioritization
6.2
Perception, Memory, and Investigation
6.3
Models and Concepts for Infosec
6.4
Exercise 4.1: Alert Triage & Prioritization
6.5
Structure Analytical Techniques
6.6
Analysis Questions and Tactics
6.7
Analysis OPSEC
6.8
Exercise 4.2: Structured Analysis Challenge
6.9
Intrusion Discovery
6.10
Incident Closing and Quality Review
6.11
Exercise 4.3: Collecting and Documenting Incident Information
Chapter 5: Continuous Improvement, Analytics, and Automation
11
7.1
Improving Life in the SOC
7.2
Analytic Features and Enrichment
7.3
New Analytic Design, Testing, and Sharing
7.4
Tuning and False Positive Reduction
7.5
Exercise 5.1: Alert Tuning
7.6
Automation and Orchestration
7.7
Improving Operational Efficiency and Workflow
7.8
Exercise 5.2: Security Automation
7.9
Containing Identified Intrusions
7.10
Exercise 5.3: Incident Containment
7.11
Skill and Career Development
Final Exam
0
Project: Day in the Life of a SOC Analyst
8
9.1
Background
10 Minutes
9.2
Alert (1): Suspicious Behavior on Corporate Web Server
15 Minutes
9.3
Alert (2): Unauthorized Access and File Exfiltration
15 Minutes
9.4
Alert (3): Possible Malware on Windows Host
25 Minutes
9.5
Alert (4): Possible Malware Detected
20 Minutes
9.6
Alert (5): Phishing Email Campaign
5 Minutes
9.7
Project Rubric
15 Minutes
9.8
Project Details and Submission
14 Days
Security Operations Analyst
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content