SOC Analyst

SOC Analyst Internship

Vigilance Unleashed: Analyzing, Detecting, and Responding to the Digital Symphony

8 Weeks

30 Challenges

Internship Details

Duration : 8 Weeks

The SOC Analyst Internship Program is an 8-week intensive course designed to train interns in the crucial aspects of working in a Security Operations Center (SOC). The program begins with an introduction to SOC operations, understanding the threat landscape, basic networking, and Syslog fundamentals. Interns then advance to more in-depth topics such as data collection techniques, configuring advanced Syslog settings, initial data analysis, and understanding the roles of firewalls, IDS, and IPS in data logging.

In the following weeks, interns gain expertise in advanced data collection methods, including network flows analysis, packet capture, data normalization, and log management using open-source tools. The program also covers topics in security events, incident response, advanced analysis techniques, threat intelligence gathering, and the utilization of SIEM tools. Reporting skills are developed through tasks involving SIEM analysis and compliance reporting.

The final weeks focus on advanced incident handling and operations, including forensic basics, suggestions for SOC efficiency improvements, and collaboration tool usage. The internship culminates with a capstone project, where interns conduct a comprehensive security analysis on a provided scenario, and a final presentation summarizing their internship experience and learnings.

Skills To Learn

SOC Operations Threat Landscape Analysis Basic Networking Syslog Usage Data Collection Techniques Advanced Syslog Configuration Traffic Analysis Network Flows Analysis Packet Capture Data Normalization Log Management Security Event Simulation Incident Categorization Incident Severity Assessment Basic Incident Response Statistical Anomaly Detection Threat Intelligence Gathering SIEM Tool Operations Vulnerability Scanning Patch Management Compliance Standards Reporting Advanced Incident Response Forensic Analysis SOC Efficiency Improvement Strategies Collaboration in Incident Management Capstone Project Execution Reporting

Tools To Practice

Splunk

Splunk

ArcSight

ArcSight

QRadar

QRadar

LogRhythm

LogRhythm

ELK Stack

ELK Stack

Snort

Snort

Suricata

Suricata

Demisto

Demisto

Phantom

Phantom

Cisco Firepower

Cisco Firepower

Palo Alto Networks

Palo Alto Networks

CrowdStrike

CrowdStrike

Carbon Black

Carbon Black

ThreatConnect

ThreatConnect

Anomali

Anomali

Graylog

Graylog

Loggly

Loggly

Bro (Zeek)

Bro (Zeek)

Security Onion

Security Onion

Nessus

Nessus

Qualys

Qualys

Cuckoo

Cuckoo

Joe Sandbox

Joe Sandbox

Course Instructor


Muhammad Afzal

Meet our Cybersecurity Maestro—an expert in the dynamic world of cybersecurity. With a wealth of experience, our instructor guides you through ethical hacking, penetration testing, and more. In an era where digital security is paramount, they equip you with hands-on skills to safeguard assets and fend off threats. Whether you're into Red Teaming, network security, or fortifying systems, our mentor's expertise lights your path to success. Join us and learn from the best in the field.

More Internships

Course 1

Blue Team Engineer

Defending the Digital Frontier: Be the Shield in Cybersecurity

0

(43)

$ Enrollment Fee Applicable