Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.

NSD Empaneled ISAC Certified

SOC Analyst (ICSA)

 

The SOC Analyst program is an 85-hour, job-oriented industry certification designed to equip participants with essential skills for a career in cybersecurity. The program focuses on triaging and root cause analysis (RCA), effective threat hunting approaches, and leveraging threat intelligence for detecting attacks.

Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.​

Our advanced technical training program is available on demand for groups of at least 10 participants. For further details, please contact us.

Open Source Intelligence is the lucrative ocean of information, that everyone wants to dive in. Join the program and enhance your skills.

It also covers Security Orchestration, Automation, and Response (SOAR), User and Entity Behavior Analytics (UEBA), and provides practical training in event log analysis.

Program Outline

  • Emerging attack trends
  • Understanding Modern SOC Architecture
  • Roles and responsibilities in SOC
  • Risk of unmapped, unmonitored network
  • Establishing baselines for normal activities
  • Key principles of network defense architecture
  • Collection of Data
  • Generating statistical data from existing data
  • Detection mechanism, Indicators of compromise & Signatures
  • Strategy for implementing EDR
  • Detecting Incidents in SOC
  • Searching across endpoints for IOCs
  • Hands-on EDR
  • Various pillars of continuous monitoring
  • Continuous integration
  • Continuous monitoring
  • Malware infection
  • Detecting malware via event logs
  • Analysis and Reporting
  • Hands-on activity using virtual labs
  • High volume alerts and prioritizing for security
  • Triaging techniques
  • Validating data and submitting analysis for investigation
  • Pursuing abnormal activity on servers & end-points
  • Hand-on activity of threat hunting
  • Detecting unknown attacks – approaches
  • Various components of modern SOC
  • Understanding SOAR
  • Uses of UEBA
  • Effectively building and using Threat Intelligence
  • Various bottlenecks in SOC Operations
  • People & process issues
  • Technology and implementation challenges
 
  • Daily SOC Operations – best practices
  • Common mistakes to avoid
  • Real world case studies

Program Outcome

  • Continuously monitor networks for security threats, investigating breaches and incidents to ensure timely responses.

Utilize security tools such as firewalls and encryption software to safeguard systems, documenting and assessing breaches when they occur.

Collaborate with the security team to test network defenses, identify vulnerabilities, and implement fixes to maintain high-security standards.

Develop IT security best practices, perform penetration testing, and stay informed on the latest security trends to guide strategic improvements.

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

What You Get

Live instructor led sessions
The live interactive sessions are conducted by the industry experts
Access to e-learning videos

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

Access to Cyberange Virtual Labs

60 Day access to Cyberange Virtual Labs (ID/Password will be sent via email)

ISAC Certified SOC Analyst Certification

Eligible to be empaneled in National Security Database

Get listed in the National Security Database program at the Falcon level by completing the program.

Complimentary attempts to pass

The Examination includes two free attempts, allowing candidates a second chance to improve their scores or deepen their understanding without additional costs. This benefit supports candidates in achieving certification with confidence and flexibility.

Complimentary access to the ISAC Members ICBIS community

Enjoy complimentary access to the exclusive ISAC Members ICBIS community, connecting you with industry experts and peers. Engage in valuable discussions, share insights, and stay updated on the latest in Cyber Security.

PROGRAM

Features & Benefits

ISAC Community

Get access to the exclusive ISAC Community. Enhance your profile credibility globally. 

Know More

60 Days Access to Cyberange Virtual Labs

Help the victims of cybercrimes. Be a part of a global community and Get Recognition.

Know More

Hands- On with Cyberange Virtual Labs

Get 60 Days access to Cyberange Virtual Labs for hands-on practice:
  • Penetration Testing Labs
  • Social Engineering Labs
  • Malware Labs
  • Cyber Forensic Labs
  • Password Cracking Labs
  • Bug Bounty Labs
Learn cyber security basics practically with your Instructor with our cloud labs!