Overview

US Council logo in white and blue. Certified SOC Analyst + Cybersecurity Professional Course

This cybersecurity course is designed by veteran industry experts, including PhD holders, who have worked in critical sectors of national importance such as space, defense, and more. It is taught by professionals with extensive hands-on experience in implementing projects at key locations.

The Cybersecurity Associate - SOC Analyst course is designed to provide a comprehensive understanding of the fundamental concepts and practical skills required to start a career in Cybersecurity. This program is ideal for individuals aspiring to become SOC Analyst , equipping them with the knowledge and hands-on experience required to monitor a network in the Security Operations Center and to further pursue Cybersecurity Professional course.

Cybersecurity Professional course is designed to give you a comprehensive understanding of cybersecurity concepts and practices, equipping you with the skills and knowledge necessary to defend against cyber attacks. Whether you are a network administrator or security professional or simply interested in learning about cybersecurity, this course will provide you with the skills you need to help keep your systems and data secure.

Curriculum

Cybersecurity Associate - SOC Analyst

1 Month

+FREE US Council logo in white and blue. Certification Exam Voucher - worth $300

Module 1: Introduction to Cybersecurity

  • What is Cybersecurity
  • Understanding the Cybersecurity terminology
  • Components of Cybersecurity
    • Networking
    • Server administration
    • Security Operations Center

Module 2: Fundamentals of Networking

  • Introduction to Networking
  • Understanding Networks and Networking
  • Types of Networks: LAN, MAN, WAN, and Internet
  • Network Topologies: Bus, Ring, Star, and Mesh
  • Essential Network Components: NIC Cards, MAC Addresses, Media, and Devices (Hubs, Switches, Routers, Firewalls)
  • OSI Reference Model and TCP/IP Model

Module 3: Basics of Operating Systems

  • Introduction to Operating Systems
  • Overview of Windows, Linux, and Mac OS
  • Server vs. Client Operating Systems
  • Installation Processes for Windows Server 2022, Windows 11, Ubuntu Server and Ubuntu Client

Module 4: Fundamentals of Networking

  • Understanding LAN Networks
  • Setting up a LAN: Components and Functions
  • Working with Hubs, Switches: Broadcast Traffic, Flooding, MAC Tables, Unicast

Module 5: Principles of IP Addressing

  • Understanding IP Addresses
  • Types of IP Addressing: IPv4 and IPv6
  • Subnetting Techniques

Module 6: Configuring, Administering and Managing Windows Server

  • Active Directory Setup and Management
  • Domain and Workgroup Models
  • User and Group Policies
  • File and Printer Sharing
  • DHCP and DNS Services
  • Internet Information System (IIS)

Module 7: Configuring, Administering and Managing Linux Server

  • Linux Operating System Basics
  • Linux Filesystem and User Accounts
  • File Permissions and Package Management
  • Setting up Web and FTP Servers

Module 8: Implementing WAN Connectivity between Multiple Organization Locations

  • Introduction to Routers and Their Functions
  • Configuring Cisco Routers
  • WAN Connectivity and Routing Principles
  • Types of Routing: Static, Dynamic and Default

Module 9: Implementing Internet Connectivity

  • Network Address Translation (NAT) and Port Address Translation (PAT)
  • Static NAT
  • Configuring Organization Routers
  • Configuring Home WiFi Routers
  • WiFi Security for Home Users

Module 10: System and Network Troubleshooting Techniques

  • Troubleshooting System, LAN and WAN Connectivity Issues

Module 11: Introduction to Cloud Technologies

  • Understanding Cloud Computing
  • Types of Cloud Technologies: SAAS, PAAS, IAAS
  • Overview of Cloud Service Providers:AWS, Azure, GCP
  • Creating Cloud Machines on AWS, Azure and GCP

Module 12: Commonly used Protocols & Ports

  • ARP Protocol
  • DHCP Protocol
  • DNS Protocol
  • HTTP Protocol
  • FTP Protocol
  • SMTP Protocol
  • SSH Protocol
  • Telnet Protocol

Module 13: Cyber Threats and Incident Response

  • Common Cyber Threats
  • Host discovery
  • Service enumeration
  • Vulnerability scanning
  • Web application attacks
    • Directory traversal
    • Cross-site scripting
    • SQL Injection
  • Password cracking
    • Brute force attack
    • Dictionary attack
    • Phishing attack
  • Man-in-the-middle attack
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Malware types
    • Virus
    • Worms
    • Trojans
    • Ransomware
  • Incident Response

Module 14: Security Operations Centre (SOC)

  • What is SOC
  • Roles and responsibilities of SOC
  • Tools & Technologies in SOC
    • Firewall
    • IDS
    • IPS
    • Next gen. Firewall
    • UTM
    • SIEM
    • Endpoint Detection and Response (EDR)
  • Security Information and Event Management (SIEM)
    • What is SIEM
    • Functions of SIEM
    • SIEM dashboard and alerts

Module 15: Best Practices in Cybersecurity

Cybersecurity Professional

1 Month

+FREE US Council logo in white and blue. Certification Exam Voucher - worth $500

Module 1: Security Risk Assessment (Ethical Hacking)

Introduction to Hacking

  • What is Hacking
  • What is Ethical Hacking
  • What is Information Security
  • What is Information Assurance
  • CIA Triad
  • Stages of Hacking

Vulnerability Based Hacking Footprinting

  • What is Footprinting
  • Footprinting Objectives
  • Footprinting Techniques

Scanning

  • What is Scanning
  • What is Enumeration
  • Scanning Methodology
  • What is Vulnerability Auditing
  • What is Penetration Testing
  • Continuous Automated Red Teaming (CART)
  • AI Fuzzing

Hacking Web Applications

  • Directory Traversal
  • Website Defacement
  • Code Injection
  • SQL Injection
  • XSS

Cryptography

  • Common Terminology
  • Symmetric Key Encryption
  • Asymmetric Key Encryption

Password Hacking Attacks & Password Cracking Attacks

  • Bruteforce attack
  • Dictionary attack
  • Rainbow table attack

Sniffers

  • What is a sniffer
  • Sniffing techniques
  • ARP Poisoning
  • Session Hijacking

Phishing

  • What is Phishing
  • Spear Phishing
  • Deepfake Phishing
  • Whaling
  • Pharming

Wireless Hacking

  • What is a wireless network
  • Types of wireless networks
  • Wireless network attacks

Malware

  • What is a Malware
  • Types of Malwares

IoT Attacks

  • What is IoT
  • IoT communication methods
  • IoT Operating Systems
  • IoT Attacks

Cloud Computing

  • What is Cloud Computing
  • Types of Cloud Computing
  • Types of Cloud Computing Services
  • Cloud Computing Attacks

Blockchain Attacks

  • What is Blockchain
  • Blockchain Attacks

Covering Tracks DoS

  • What is DoS
  • DoS attack techniques

Anonymizers

  • What is an anonymizer
  • Proxy server
  • VPN server
  • TOR Browser

DarkWeb

  • What is DarkWeb
  • Different DarkWeb technologies

Cyber Kill Chain

Securing the network

MITRE ATTACK Framework

Security Compliance Standards

Module 2: Proactive Defence and Countermeasures

Introduction to Security

  • Network Security Challenges
  • Elements of Information Security
  • Security, Functionality and Usability Triangle
  • Zero Trust approach
  • Castle Moat approach

Firewall

  • What is a Firewall
  • Types of Firewall
  • Designing network security with Firewall
  • Secure Access Service Edge (SASE)
  • NAT
  • Security Policy
  • Logs Management
  • Application Security
  • Content / Web Security
  • Authentication

Virtual Private Networks

  • What is VPN
  • Type of VPNs
  • GRE
  • IPSEC
  • SSL

Intrusion Prevention Systems

  • What is an Intrusion Detection System
  • What is an Intrusion Prevention System

Unified Threat Management

  • What is UTM
  • How UTM is different from Firewall
  • Advantages of UTM

Module 3: SIEM & Incident Response

SIEM

  • What is SIEM
  • Functions of SIEM
  • SIEM architecture

Incident Management

  • Incident response policy
  • Incident Handling

Course Schedule

Course Schedule

16th Jan 2025

8:00 AM - 10:00 AM

(IST - GMT +5.30)

2 Months

2 Hrs/Day

Online

For Online Training Students

  • Instructions will be Provided to do Lab Practicals with your PC at Home
  • You will receive a link to your email in an hour after the class from Webex to Download the Recorded Videos..
  • All our study materials are available for free access on our online portal for registered students

Imp. Note

  • Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
  • Organization reserves the right to expel any student during the training period.
  • In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.

FAQ'S

What is US-Council Certification and how does it differ from other cybersecurity certification?

US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.

Why should I choose US-Council for my cybersecurity certifications?

Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.
Cybersecurity SOC Analyst and Professional course promotional slider Preview this course
Duration : 2 months
Mode Of Training : Online/Classroom
Placement Assistance : Yes
Certificate : Yes
Price: 25,000

All prices are subject to an 18% Goods and Service Tax (GST) Charge. Rate quoted in U.S. dollars subject to change according to Foreign Exchange rates.

Once you make the payment, kindly contact our course counsellor at priya@zoomgroup.com to schedule the course as per your convenience from the available slots.