Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.


SOC Analyst (ICSA)

The ISAC Certified SOC Analyst, 85 hours program is a job oriented industry certification. The focus is on:

  • Triaging and Analysis for root cause analysis (RCA)
  • Threat Hunting approaches
  • Using Threat Intelligence for detecting attacks
  • SOAR and UEBA
  • Practical event log analysis

Available on GeM

Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.​

Standard Price: $300 + GST + Training is Complimentary

NSD Empanelment Price (Optional): $70 + GST

Data Forensics. Digital Forensic Investigator at Work


Features & Benefits

ISAC Community

  • Get exclusive access to ISAC Community
  • Enhance your profile credibility globally
  • Eligible for NSD Empanelment

30 Days Access to Cyberange Virtual Labs

  • Exclusive labs
  • Real-world scenarios for practice
  • Cloud-based labs with new challenges added every month!


Get NSD Empanelment Today!

Learn everything to get started Forensics Investigations.

Course Objectives

  • Monitor computer networks for security issues.
  • Investigate security breaches and other cyber security incidents.
  • Operate tools and software to protect systems and information infrastructure, including firewalls and data encryption programs.
  • Document security breaches and assess the damage they cause.
  • Work with security team to perform tests and uncover network vulnerabilities.
  • Fix detected vulnerabilities to maintain a high-security standard.
  • Stay current on IT security trends and news.
  • Develop company-wide best practices for IT security.
  • Perform penetration testing.
  • Research security enhancements and make recommendations to management.
  • Stay up-to-date on information technology trends and security standards.
Module 1 – Modern Security Architecture Principles
  • Emerging attack trends
  • Understanding Modern SOC Architecture
  • Roles and responsibilities in SOC
Module 2 – Defensible Network Security Architecture Principles Applied
  • Risk of unmapped, unmonitored network
  • Establishing baselines for normal activities
  • Key principles of network defense architecture
Module 3 – Network Security Monitoring
  • Collection of Data
  • Generating statistical data from existing data
  • Detection mechanism, Indicators of compromise & Signatures
Module 4 – Endpoint Security Architecture
  • Strategy for implementing EDR
  • Detecting Incidents in SOC
  • Searching across endpoints for IOCs
  • Hands-on EDR
Module 5 – Automation and Continuous Security Monitoring
  • Various pillars of continuous monitoring
  • Continuous integration
  • Continuous monitoring
Module 6 – Hands on: Detecting Malware via Windows Event Logs
  • Malware infection
  • Detecting malware via event logs
  • Analysis and Reporting
Module 7 – Hands-on Case Studies and Practical session
  • Hands-on activity using virtual labs
Module 8 – Triaging & Analysis
  • High volume alerts and prioritizing for security
  • Triaging techniques
  • Validating data and submitting analysis for investigation
Module 9 – Practical Threat Hunting
  • Pursuing abnormal activity on servers & end-points
  • Hand-on activity of threat hunting
  • Detecting unknown attacks – approaches
Module 10 – SOC Components – SIEM, Threat Intelligence, SOAR, EDR, UEBA
  • Various components of modern SOC
  • Understanding SOAR
  • Uses of UEBA
  • Effectively building and using Threat Intelligence
Module 11 – People Process & Technology
  • Various bottlenecks in SOC Operations
  • People & process issues
  • Technology and implementation challenges
Module 12 – SOC – Daily Operations & Management
  • Daily SOC Operations – best practices
  • Common mistakes to avoid
  • Real world case studies


Dr Bhupendra Singh

ISAC Certified Instructor
Assistant Professor, Dept. of Computer Science & Engg. Indian Institute of Information Technology (IIIT), Pune

Upcoming Events:

You will get weekly assignments and research work to enhance your course understanding. 

Who Should Attend

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel


24 Hours Lab Exam under the Information Sharing and Analysis Center

What you get

30 Days Access to Cyber Range Virtual Labs

Get 30 days access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you!

Access to e-learning videos

Get access to course videos on the ISAC e-learning portal, updated regularly!

Clean Exit Professional Ethics Certification

The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.

Profile in the National Security Database

Get listed in the National Security Database program at the Falcon level by completing the program.

30 Days Access to Cyber Range Virtual Labs

The ISAC SOC Analyst is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.
Hands On Labs