SOC-200: Foundational Security Operations and Defensive Analysis
The Security Operations and Defensive Analysis (SOC-200) course teaches the fundamentals of protecting networks and systems against cyber threats. Students gain practical experience in a hands-on, self-paced environment that covers the foundations of SOC operations.
Individuals who complete the online training course and pass the tough test are awarded the OffSec Defence Analyst (OSDA) credential. This certificate demonstrates your ability to recognize, analyze, and evaluate potential security events through live exercises. The OSDA stands apart in the cybersecurity field by emphasizing its commitment to hands-on defensive skills that businesses value.
Who is it For?
The SOC-200 certification course is ideal for security professionals who want to strengthen their defensive analysis and response skills while achieving the OSDA. It is designed for persons with a strong networking background and some experience with Linux and Windows platforms.
Exam Details
The OffSec Defence Analyst (OSDA) exam is a challenging 24-hour practical assessment of your defensive security skills. In a real-world lab environment, you will demonstrate your ability to recognize, analyze, and respond to potential threats. Following the exam, you have a further 24 hours to submit a well-structured incident reaction report.
Curriculum
- 10 Sections
- 0 Lessons
- 60 Hours
- Module 01 â Introduction to Security OperationsUnderstand the role of a SOC, key responsibilities of analysts, and how organizations monitor and defend their environments.0
- Module 02 â Understanding Cyber Threats and Attack LifecycleLearn how attackers operate, common threat vectors, and the stages of a cyber attack lifecycle.0
- Module 03 â Logs, Events, and MonitoringExplore different types of logs (system, network, application) and how they are used to identify suspicious activities.0
- Module 04 â SIEM Fundamentals and AlertingUnderstand how SIEM platforms collect, correlate, and analyze logs to generate alerts and detect threats in real time.0
- Module 05 â Threat Intelligence and IoCsLearn how Indicators of Compromise (IoCs) and threat intelligence feeds enhance detection and provide context to alerts.0
- Module 06 â Incident Detection and AnalysisDevelop skills to investigate alerts, validate incidents, and identify malicious behavior within an environment.0
- Module 07 â Incident Response FundamentalsUnderstand the process of responding to incidents, including containment, eradication, and recovery.0
- Module 08 â Endpoint and Network AnalysisLearn how to analyze endpoint activities and network traffic to detect lateral movement, malware, and anomalies.0
- Module 09 â Defensive Security Tools and TechniquesGain hands-on exposure to tools used in SOC environments for monitoring, detection, and response.0
- Module 10 â Reporting and DocumentationLearn how to document incidents, create reports, and communicate findings effectively to stakeholders.0