Information Sharing and Analysis Center

India's leading non-profit foundation advancing national cyber security and professional ethics at workplace

NSD Empaneled ISAC CERTIFIED

SOC Analyst (ICSA)

The ISAC Certified SOC Analyst program is a job oriented industry certification. The focus is on:

  • Triaging and Analysis for root cause analysis (RCA)
  • Threat Hunting approaches
  • Using Threat Intelligence for detecting attacks
  • SOAR and UEBA
  • Practical event log analysis

Available on GeM

Data Forensics. Digital Forensic Investigator at Work

PROGRAM

Features & Benefits

ISAC Community

  • Get exclusive access to ISAC Community
  • Enhance your profile credibility globally
  • Eligible for NSD Empanelment

30 Days Access to Cyberange Virtual Labs

  • Exclusive labs
  • Real-world scenarios for practice
  • Cloud-based labs with new challenges added every month!

VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION

Get NSD Empanelment Today!

Learn everything to get started Forensics Investigations.

Course Objectives

  • Monitor computer networks for security issues.
  • Investigate security breaches and other cyber security incidents.
  • Operate tools and software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Develop company-wide best practices for IT security.
  • Perform penetration testing.
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
  •  
Module 1 – Modern Security Architecture Principles
  • Emerging attack trends
  • Understanding Modern SOC Architecture
  • Roles and responsibilities in SOC
Module 2 – Defensible Network Security Architecture Principles Applied
  • Risk of unmapped, unmonitored network
  • Establishing baselines for normal activities
  • Key principles of network defense architecture
Module 3 – Network Security Monitoring
  • Collection of Data
  • Generating statistical data from existing data
  • Detection mechanism, Indicators of compromise & Signatures
Module 4 – Endpoint Security Architecture
  • Strategy for implementing EDR
  • Detecting Incidents in SOC
  • Searching across endpoints for IOCs
  • Hands-on EDR
Module 5 – Automation and Continuous Security Monitoring
  • Various pillars of continuous monitoring
  • Continuous integration
  • Continuous monitoring
Module 6 – Hands on: Detecting Malware via Windows Event Logs
  • Malware infection
  • Detecting malware via event logs
  • Analysis and Reporting
Module 7 – Hands-on Case Studies and Practical session
  • Hands-on activity using virtual labs
Module 8 – Triaging & Analysis
  • High volume alerts and prioritizing for security
  • Triaging techniques
  • Validating data and submitting analysis for investigation
Module 9 – Practical Threat Hunting
  • Pursuing abnormal activity on servers & end-points
  • Hand-on activity of threat hunting
  • Detecting unknown attacks – approaches
Module 10 – SOC Components – SIEM, Threat Intelligence, SOAR, EDR, UEBA
  • Various components of modern SOC
  • Understanding SOAR
  • Uses of UEBA
  • Effectively building and using Threat Intelligence
Module 11 – People Process & Technology
  • Various bottlenecks in SOC Operations
  • People & process issues
  • Technology and implementation challenges
Module 12 – SOC – Daily Operations & Management
  • Daily SOC Operations – best practices
  • Common mistakes to avoid
  • Real world case studies

Instructors

Dr Bhupendra Singh


ISAC Certified Instructor
Assistant Professor, Dept. of Computer Science & Engg. Indian Institute of Information Technology (IIIT), Pune

Upcoming Events:

You will get weekly assignments and research work to enhance your course understanding. 

Who Should Attend

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

Examination

24 Hours Lab Exam under the Information Sharing and Analysis Center

What you get

Get 30 days access to Cyber Range Virtual Labs - Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!

Get access to course videos on the ISAC e-learning portal, updated regularly!

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.

Get listed in the National Security Database program at the Falcon level by completing the program.

30 Days Access to Cyber Range Virtual Labs

The ISAC SOC Analyst is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.
Hands On Labs