Certified Soc Analyst (CSA) Certification Training | Emigo
ccna-banner-image

EC-Council Certified SOC Analyst (CSA)

The EC-Council Certified SOC Analyst (CSA) certification is designed to equip professionals with essential skills in security operations, threat intelligence, and incident response.

EC-Council Certified SOC Analyst (CSA)

The EC-Council Certified SOC Analyst (CSA) certification is designed to equip professionals with essential skills in security operations, threat intelligence, and incident response. It covers processes, technologies, and techniques used to detect, investigate, and respond to threats, including SIEM deployment and SOC development. Graduates gain proficiency in centralized log management, incident triaging, investigating Indicators of Compromise (IoCs), and applying the cyber kill chain.

Course Overview

The EC-Council Certified SOC Analyst (CSA) program, offered by Emigo Networks, is designed for both current and aspiring Tier I and Tier II SOC analysts. This program equips candidates with the essential skills required to excel in Security Operations Centers (SOCs). Through expert-led instruction, participants gain proficiency in SOC operations, log management, SIEM deployment, advanced incident detection, and incident response. The curriculum emphasizes hands-on learning, ensuring candidates acquire the in-demand technical skills needed to perform critical tasks in the cybersecurity field.

The CSA program by EMIGO NETWORKS not only focuses on the fundamentals of SOC operations but also covers more advanced topics, such as incident response strategies and effective collaboration with CSIRT teams. By completing this training, candidates are prepared to manage various SOC processes and contribute dynamically to security teams. With the growing demand for cybersecurity professionals, this program opens doors to new career opportunities by enhancing capabilities and expertise in security operations.

What You'll Learn

  • Master SOC Operations: Gain proficiency in Security Operations Center (SOC) fundamentals, including log management, SIEM deployment, and incident triaging. 
  • Enhance Threat Detection: Learn to investigate Indicators of Compromise (IoCs) and apply the cyber kill chain methodology. 
  • Implement AI-Driven Tools: Utilize AI-enabled platforms like Splunk AI, Elastic AI, and ChatGPT to automate threat detection and prioritize alerts. 
  • Develop SOC Infrastructure: Understand SOC architecture and processes to effectively manage security operations. 
  • Hands-On Experience: Engage in 50+ labs and utilize 120+ tools to build practical skills in threat hunting and incident response.

Syllabus Summary

SOC Essential Concepts

Computer Network Fundamentals

TCP/IP Protocol Suite

Application Layer Protocols

Transport Layer Protocols

Internet Layer Protocols

Link Layer Protocols

IP Addressing and Port Numbers

Network Security Controls

Network Security Devices

Windows Security

Unix/Linux Security

Web Application Fundamentals

Information Security Standards, Laws and Acts

Security Operations and Management
  • Security Management
  • Security Operations
  • Security Operations Center (SOC)
  • Need of SOC
  • SOC Capabilities
  • SOC Operations
  • SOC Workflow
  • Components of SOC: People, Process and Technology
  • People
  • Technology
  • Processes
  • Types of SOC Models
  • SOC Maturity Models
  • SOC Generations
  • SOC Implementation
  • SOC Key Performance Indicators
  • Challenges in Implementation of SOC
  • Best Practices for Running SOC
  • SOC vs NOC
Understanding Cyber Threats, IoCs and Attack Methodology
  • Cyber Threats
  • Intent-Motive-Goal
  • Tactics-Techniques-Procedures (TTPs)
  • Opportunity-Vulnerability-Weakness
  • Network Level Attacks
  • Host Level Attacks
  • Application Level Attacks
  • Email Security Threats
  • Understanding Indicators of Compromise
  • Understanding Attacker's Hacking Methodology
Incidents, Events and Logging
  • Incident
  • Event
  • Log
  • Typical Log Sources
  • Need of Log
  • Logging Requirements
  • Typical Log Format
  • Logging Approaches
  • Local Logging
  • Centralized Logging
Incident Detection with Security Information and Event Management (SIEM)
  • Security Information and Event Management (SIEM)
  • Security Analytics
  • Need of SIEM
  • Typical SIEM Capabilities
  • SIEM Architecture and Its Components
  • SIEM Solutions
  • SIEM Deployment
  • Incident Detection with SIEM
  • Examples of Commonly Used Use Cases Across all SIEM deployments
  • Handling Alert Triaging and Analysis
Enhanced Incident Detection with Threat Intelligence
  • Understanding Cyber Threat Intelligence
  • Why-Threat Intelligence-driven SOC?
Incident Response
  • Incident Response
  • Incident Response Team (IRT)
  • Where does IRT Fit in the Organisation
  • SOC and IRT Collaboraton
  • Incident Response (IR) Process Overview
  • Step 1: Preparation for Incident Response
  • Step 2: Incident Recording and Assignment
  • Step 3: Incident Triage
  • Step 4: Notification
  • Step 5: Containment
  • Step 6: Evidence Gathering and Forensic Analysis
  • Step 7: Eradication
  • Step 8: Recovery
  • Step 9: Post-Incident Activities
  • Responding to Network Security Incidents
  • Responding to Application Security Incidents
  • Responing to Email Security Incidents
  • Responding to Insider Incidents
  • Responding to Malware Incidents

Pre-requisites

  • Network or Security administration experience recommended

Required Exams

  • EXAM : 312-39  
  • COST : $450 USD
  • DURATION : 3 Hours

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry