Curriculum
9 Sections
124 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction to Cyber Dojo Platform
5
1.1
About Cyber Dojo
1.2
How to book your live sessions
5 Minutes
1.3
Session Booking Panel
1.4
Student Panel
1.5
Join Our Channels
Introduction to Security Operations and Analysis Course
1
2.1
Course Overview
6 Minutes
Chapter 1: Blue Team Tools and Operations
26
3.1
Chapter Overview
2 Minutes
3.2
Welcome to the Blue Team
30 Minutes
3.3
SOC Overview
1 Hour
3.4
Exercise 1.0: Virtual Machine Setup
13 Minutes
3.5
TryHackMe SOC Level 1 Path Intro
7 Minutes
3.6
TryHackMe Bonus Lab: Junior Security Analyst Intro
27 Minutes
3.7
Defensible Network Concepts
46 Minutes
3.8
Events, Alerts, Anomalies, and Incidents
52 Minutes
3.9
Incident Management Systems
1 Hour
3.10
Exercise 1.1: TheHive Incident Management System
24 Minutes
3.11
TryHackMe Bonus Lab: TheHive Project
40 Minutes
3.12
Threat Intelligence Platforms
1 Hour
3.13
MISP Overview
10 Minutes
3.14
Exercise 1.2: MISP Threat Intelligence Platform
29 Minutes
3.15
TryHackMe Bonus Lab: Intro to Cyber Threat Intel
22 Minutes
3.16
TryHackMe Bonus Lab: Threat Intelligence Tools
1 Hour
3.17
TryHackMe Bonus Lab: OpenCTI
46 Minutes
3.18
TryHackMe Bonus Lab: MISP
19 Minutes
3.19
TryHackMe Bonus Lab: Yara
1 Hour
3.20
SIEM and Automation
1 Hour
3.21
Know Your Enemy
51 Minutes
3.22
Exercise 1.3: SIEM with the Elastic Stack
45 Minutes
3.23
TryHackMe Bonus Lab: Introduction to SIEM
40 Minutes
3.24
Quiz: CTI Analyst
1 Day
19 Questions
3.25
TryHackMe Bonus Lab: Friday Overtime
19 Minutes
3.26
TryHackMe Bonus Lab: Trooper
18 Minutes
Chapter 2: Understanding Your Network
28
4.1
Chapter 2 Overview
7 Minutes
4.2
Network Architecture
1 Hour
4.3
Traffic Capture and Analysis
41 Minutes
4.4
Understanding DNS
55 Minutes
4.5
DNS Analysis and Attacks
2 Hours
4.6
Exercise 2.1: Exploring DNS
54 Minutes
4.7
Understanding HTTP
47 Minutes
4.8
TryHackMe Bonus Lab: Web Application Basics
40 Minutes
4.9
HTTP(S) Analysis and Attacks
1 Hour
4.10
Exercise 2.2: HTTP and HTTPS Analysis
34 Minutes
4.11
Understanding SMTP and Email
47 Minutes
4.12
Exercise 2.3: SMTP and Email Analysis
1 Hour
4.13
Additional Network Protocols
54 Minutes
4.14
TryHackMe Bonus Lab: Traffic Analysis Essentials
37 Minutes
4.15
TryHackMe Bonus Lab: Snort
1 Hour
4.16
TryHackMe Bonus Lab: Snort Challenge – The Basics
1 Hour
4.17
TryHackMe Bonus Lab: Snort Challenge – Live Attacks
15 Minutes
4.18
TryHackMe Bonus Lab: NetworkMiner
41 Minutes
4.19
TryHackMe Bonus Lab: Zeek
1 Hour
4.20
Quiz: TryHackMe: Zeek Exercises
2 Hours
14 Questions
4.21
TryHackMe Bonus Lab: Zeek Exercises
33 Minutes
4.22
TryHackMe Bonus Lab: Brim
43 Minutes
4.23
Quiz: Masterminds
2 Hours
23 Questions
4.24
TryHackMe Bonus Lab: Wireshark: The Basics
43 Minutes
4.25
TryHackMe Bonus Lab: Wireshark: Packet Operations
37 Minutes
4.26
TryHackMe Bonus Lab: Wireshark: Traffic Analysis
1 Hour
4.27
Quiz: Carnage
2 Hours
19 Questions
4.28
Quiz: Warzones
2 Hours
22 Questions
Chapter 3: Understanding Endpoints, Logs, and Files
26
5.1
Chapter 3 Overview
8 Minutes
5.2
Endpoint Attack Tactics
2 Hours
5.3
Endpoint Defense In Depth
2 Hours
5.4
Bonus Session: LOLBins: The Double-Edged Sword of Cybersecurity and How to Hunt for Them
2 Hours
5.5
TryHackMe Bonus Lab: OpenVAS
28 Minutes
5.6
TryHackMe Bonus Lab: Nessus
38 Minutes
5.7
How Windows Logging Works
20 Minutes
5.8
How Linux Logging Works
18 Minutes
5.9
Interpreting Important Events
1 Hour
5.10
Exercise 3.1: Interpreting Windows Logs
1 Hour
5.11
Bonus Session: Understanding Kerberos and AD Attacks
2 Hours
5.12
Log Collection, Parsing, and Normalization
43 Minutes
5.13
Exercise 3.2: Log Enrichment and Visualization
28 Minutes
5.14
File Contents and Identification
37 Minutes
5.15
Identifying and Handling Suspicious Files
1 Hour
5.16
Exercise 3.3: Malicious File Identification
1 Hour
5.17
TryHackMe Bonus Lab: Intro to Endpoint Security
25 Minutes
5.18
TryHackMe Bonus Lab: Core Windows Processes
42 Minutes
5.19
TryHackMe Bonus Lab: Sysinternals
5.20
TryHackMe Bonus Lab: Windows Event Logs
5.21
TryHackMe Bonus Lab: Sysmon
5.22
TryHackMe Bonus Lab: Osquery: The Basics
5.23
TryHackMe Bonus Lab: Wazuh
5.24
Quiz: Endpoint Security Monitoring
3 Hours
16 Questions
5.25
TryHackMe Bonus Lab: Monday Monitor
5.26
TryHackMe Bonus Lab: Retracted
Chapter 4: Triage and Analysis
29
6.1
Chapter 4 Overview
10 Minutes
6.2
Alert Triage and Prioritization
1 Hour
6.3
Perception, Memory, and Investigation
50 Minutes
6.4
Models and Concepts for Infosec
2 Hours
6.5
Bonus Session: Incident Response Process
2 Hours
6.6
Exercise 4.1: Alert Triage & Prioritization
59 Minutes
6.7
TryHackMe Bonus Lab: Pyramid Of Pain
6.8
TryHackMe Bonus Lab: Cyber Kill Chain
6.9
TryHackMe Bonus Lab: Unified Kill Chain
6.10
TryHackMe Bonus Lab: Diamond Model
6.11
TryHackMe Bonus Lab: MITRE
6.12
Quiz: Summit
10 Minutes
0 Questions
6.13
TryHackMe Bonus Lab: Summit
6.14
Quiz: Eviction
10 Minutes
0 Questions
6.15
TryHackMe Bonus Lab: Eviction
6.16
Structure Analytical Techniques
1 Hour
6.17
Analysis Questions and Tactics
1 Hour
6.18
Analysis OPSEC
30 Minutes
6.19
Exercise 4.2: Structured Analysis Challenge
6.20
Intrusion Discovery
6.21
Incident Closing and Quality Review
6.22
Exercise 4.3: Collecting and Documenting Incident Information
6.23
TryHackMe Bonus Lab: Investigating with ELK 101
6.24
TryHackMe Bonus Lab: ItsyBitsy
6.25
TryHackMe Bonus Lab: Splunk: Basics
6.26
TryHackMe Bonus Lab: Incident handling with Splunk
6.27
TryHackMe Bonus Lab: Investigating with Splunk
6.28
Quiz: Benign
3 Hours
10 Questions
6.29
TryHackMe Bonus Lab: Benign
Chapter 5: Continuous Improvement, Analytics, and Automation
11
7.1
Improving Life in the SOC
7.2
Analytic Features and Enrichment
7.3
New Analytic Design, Testing, and Sharing
7.4
Tuning and False Positive Reduction
7.5
Exercise 5.1: Alert Tuning
7.6
Automation and Orchestration
7.7
Improving Operational Efficiency and Workflow
7.8
Exercise 5.2: Security Automation
7.9
Containing Identified Intrusions
7.10
Exercise 5.3: Incident Containment
7.11
Skill and Career Development
Final Exam
0
Project: Day in the Life of a SOC Analyst
8
9.1
Background
10 Minutes
9.2
Alert (1): Suspicious Behavior on Corporate Web Server
15 Minutes
9.3
Alert (2): Unauthorized Access and File Exfiltration
15 Minutes
9.4
Alert (3): Possible Malware on Windows Host
25 Minutes
9.5
Alert (4): Possible Malware Detected
20 Minutes
9.6
Alert (5): Phishing Email Campaign
5 Minutes
9.7
Project Rubric
15 Minutes
9.8
Project Details and Submission
14 Days
Security Operations and Analysis
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content