Professional Documents
Culture Documents
ANALYST (CSA)
Course Description
The Certified SOC Analyst (CSA) program is the first step to joining a
security operations center (SOC). It is engineered for current and aspiring
Tier I and Tier II SOC analysts to achieve proficiency in performing entry
level and intermediate-level operations.
As the security landscape is expanding, a SOC team offers high quality IT-security services to actively detect
potential cyber threats/attacks and quickly respond to security incidents. Organizations need skilled SOC Analysts
who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats.
The lab-intensive CSA program emphasizes the holistic approach to deliver elementary as well as advanced
knowledge of how to identify and validate intrusion attempts. Through this, the candidate will learn to use SIEM
solutions and predictive capabilities using threat intelligence. The program also introduces the practical aspect
of SIEM using advanced and the most frequently used tools. The candidate will learn to perform enhanced threat
detection using the predictive capabilities of Threat Intelligence.
Recent years have witnessed the evolution of cyber risks, creating anunsafe environment for the players of
various sectors.
To handle these sophisticated threats, enterprises need advanced cybersecurity solutions along with traditional
methods of defense. Practicing good cybersecurity hygiene and implementing an appropriate line of defense,
and incorporating a security operations center (SOC) have become reasonable solutions. The team pursues
twenty-four-hour and “follow-the-sun” coverage for performing security monitoring, security incident
management, vulnerability management, security device management, and network flow
monitoring.
A SOC Analyst continuously monitors and detects potential threats, triages the alerts, and appropriatley escalates
them. Without a SOC analyst, processes such as monitoring, detection, analysis, and triaging will lose their
effectiveness, ultimately negatively affecting
the organization.
Target Suggested
Audience Duration
Number of 100
Questions
Duration 3 hours
Gain basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities,
attacker’s behaviors, cyber kill chain, etc.
Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise
(IOCs) that can be utilized during active and future investigations.
Able to monitor and analyze logs and alerts from a variety of different technologies across
multiple platforms (IDS/IPS, end-point protection, servers and workstations).
Able to perform Security events and log collection, monitoring, and analysis.
Gain experience and extensive knowledge of Security Information and Event Management.
Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/
AlienVault/OSSIM/ELK).
Learn use cases that are widely used across the SIEM deployment.
Plan, organize, and perform threat monitoring and analysis in the enterprise.
Able to monitor emerging threat patterns and perform security threat analysis.
Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection
and response.
Gain understating of SOC and IRT collaboration for better incident response.
I strongly feel that this program I see this as the first structured
provides necessary skills for a SOC programme devoted to the skills
Analyst job role at level L1 and L2. I also required for a SOC Analyst with
believe this program will help us in specific focus on the job requirements.
upskilling our SOC team. This course This is a well designed course and
certainly benefits Network Security would benefit the SOC professionals/
Admins/Other Network Sec Job roles aspirants in acquiring the overall
and equips them with the knowledge understanding of the skills required.
to become a SOC Analyst. As a subset of the skills required in the
The program provides an In depth SOC Analyst job, this program will also
training of SOC skills and tools and is benefit other Network Security related
also beneficial to all aspects of security job roles.
program (GRC, IAM), and people in
help desk and networking teams.
- Prabir Panda,
- Dan Bowden,
Enterprise Architect Security,
CISO, Sentara Healthcare, USA
Election Commission of India
This program provides the necessary I see this program as a logical step
academic background provide an Analyst could use to progress to
necessary skill set for a SOC Analyst the next/a higher level certification,
job role at level L1 and L2. A virtual or open the opportunity to move
environment with various scenarios laterally to new certifications. A major
with playbook & runbooks examples strength I see is the program covers all
further enhances practical skills. The areas/skills for individuals in sufficient
program will benefit our SOC team depth to successfully operate as SOC
and act as valuable reference material. Analysts, and/or use the program as
According to me, the major strength of a launchpad to develop as a security
this program is the academic research professional. I am confident that this
conducted behind the creation of this program will provide the skill set
program. The Digital Forensic team, necessary for L1/L2 SOC Analysts.
Resilience, Incident Response and
Threat Intelligence teams can also
greatly benefit from this program.
- Miki Calero,
- Dawie Wentzel,
Founder,
Head of Cyber Forensics,
Urbis Global LLC (Ex-US Army)
Absa Group, South Africa