Hero Banner

Certified Security Operations Center Analyst (CSOC Part 1) Course

Set yourself on the path of becoming a highly-paid SOC analyst with this intensive training course

We have trained over 750 organizations including:

4 detailed modules with 14 sections and several detailed sub-sections

Unmatched opportunity for hands-on practical training with 85 lab sessions

Downloadable study material for strengthened conceptual development

One of the most comprehensive courses of its kind in the market for advanced learning

The Certified Security Operations Centre Analyst course (CSOC Part 1) is an intensive training programme that will help you acquire essential and sought-after technical skills to kickstart your career as a well-paid SOC analyst.

The course is delivered by some highly experienced trainers in the industry.

This course has been designed to unlock new opportunities for you through the perfect combination of intense theoretical sessions and practical training. 

Benefits of the Certified Security Operations Center Analyst (CSOC Part 1) Course

  • Acquire necessary skills and knowledge to become a sought-after SOC analyst.

  • An intensive training course that prepares you to develop critical and analytical capabilities to monitor the network & examine security flaws. 

  • Equip yourself with technical understanding of fundamentals as well as advanced concepts that will help in real-world problem solving & creative thinking

CSOC (1)


CSOC (Part 1) Course Learning Objectives:

After completing the course, you will be able to:

  • Express in your own words what CIA Triad, Common Vulnerability Exposure and Common Vulnerability Scoring System are.  
  • Understand and explain the concepts of Network Topologies and Types of Networks, OSI model & description of Layers, TCP/IP layer and offer a description of layers.
  • Articulate the basics of Protocols description, VLAN, VPN and WireShark.
  • Work with Windows NT Architecture, Linux Architecture, Windows OS Security, Linux OS Security and Apache Security.  
  • Enhance your knowledge of Network Security and Devices including understanding vulnerabilities, exploit and payload Wireless Security, Firewall, Bastion Host, DMZ, AV vs EDR and Network Security Audit.
  • Gain a fair degree of mastery over the concepts of Ethical Hacking and Attack Methodologies.
  • Improve your understanding of the concepts of Security Operations Centre or SOC.
  • Understand the fundamentals of Log Management Infrastructure, Planning and Operational Process.

Feedback and Testimonials for our Courses

Kevin Hayes
The playbooks training course was a good 'part-2' to the CIPR and went into greater depth in a number of areas. The day was fun and Amar kept us moving along at a good pace.
Kevin Hayes
CISO, Cyber Risk Associates
Russ Smith

Enjoyed the course. Good mix of attendees and plenty of lively conversation. Amar steered us through it all admirably.

Russ Smith
Kim Rose

Overall the course was very good. I would strongly recommend this training to anyone who is involved in Cyber Security or has control of information assets.

Kim Rose
Information Governance Officer, Wye Valley NHS Trust
Philipp Scheiwiler

It was a great workshop with a lot of interesting people and a great learning experience.

Philipp Scheiwiler
System Engineer
Andrew Lock
This was a very helpful day and opportunity to speak with a number of operational incident responders to discuss what really works in practice and not just in theory. I gained a great deal from the day, particularly around the construction of bespoke playbooks and also a variety of useful resources to inform my learning. A really good day.
Andrew Lock
Information Security Consultant

CSOC (Part 1) Course Modules 

Module 1 - Fundamentals
  • Introduction to Information Security and CISC-CIA Triad. Types of Hackers. Penetration Testing Vs Ethical Hacking. The different types of testing. Careers in Information Security. Legislation and Regulations. 

  • Introduction to Network Fundamentals. Components of Data Communication. Network Topology and Network Cables. Computer Network Architecture. Internet and Protocol. OSI and TCP IP Models. Understanding ICMP and an ICMP Ping.

  • Introduction to Subnetting and Supernetting. Routing, Router Security and Network Address Translation.

  • Virtual Local Area Network (VLAN) and Virtual Private Network (VPN). Firewall and IP tables. Packet Capture and Wireshark.

  • Windows NT Architecture and Windows 10 Architecture. File Permissions. Password Hashing.

  • Unix and Linux. File Permissions. Kali and Various Linux Commands.
Module 2 - Network Security
  • Reconnaissance. Packet Crafting.

  • Network Mapper Nmap.

  • Testing a firewall. Hacking Servers.

  • Netcat and Ncat. Testing Common services and protocols.

  • Hacking Passwords using Hydra, John the Ripper, Crunch and Mimikatz.

  • Metasploit Framework.

  • PowerShell. MITM ARP Poisoning, SYN Flood, Smurf Attack and Fraggle Attack. 

  • Wireless Hacking Methodology.

  • Authentication Methods and Types of WLAN Attacks. WEP, WPA/WPA-2.
Module 3 - Server Security
  • Introduction to Database and Database Security.

  • Understanding SQL Statements, DDL Statements, DML Statements.

  • Introduction to Oracle. Securing Oracle Parameters.

  • User and Profiles. Roles and Privileges.

  • Big Data. MongoDB. Hadoop.

  • Windows Security. Security Policies. Event Log.

  • Windows General Security Best Practices. 

  • Linux Security and Linux Operating System Hardening. 

  • IIS Server Security. Apache Server Security.
Module 4 - Web Application Security
  • Introduction to Web Applications. HTML and JavaScript.

  • Introduction to OWASP TOP 10.

  • Injection and Error-based Injection. Authentication Bypass using SQL Injection. Blind Injection using SQLMap. Command Injection. 

  • Broken Authentication. Brute Force. Session Management. Insufficient Transport Layer Security. Broken Access Control IDOR and MFLAC.

  • Security Misconfiguration. Cross Site Scripting (XSS). Using Components with Known Vulnerabilities. Insufficient Logging and Monitoring.

  • Web Application Security OWASP10. 

  • Browser-based Vulnerabilities. Clickjacking. POODLE. Content Spoofing. Fingerprinting. 

  • Advanced Recon.

All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.

Find out more about our one day public courses or internal workshops, please complete the form below. 

  • callOr call us on:
  • +44 (0) 203 189 1422