Security Operations Centre Analyst

Security Operations Centre Analyst

Security Operations Centre Analyst

Empower your team, fortify your defences

In Partnership With:
Ngee Ann Pol
View Course Brochure


View Brochure

Course Fee

Full Course Fees

SG Citizen (aged 21-39) or PR

SG Citizen (aged 40 & above)

Full Fees

$19,500

$19,500

$19,500

SkillsFuture Funding

-

$13,650 (70% Subsidy)

$17,550 (90% Subsidy)

Total Nett Fee

$19,500

$5,850

$1,950

GST (9%)

$1,755

$526.5

$526.5

Total Fee Payable

$21,255

$6,376.50

$2,476.50

Additional Funding: SkillsFuture Credits (up to $500), UTAP ($200-$500) & PSEA can be used to pay for course fees after subsidy

Learning Outcomes: 

    Participants will:

    • Develop expertise in Windows Server management, event logging with Sysmon, and security through Active Directory and Group Policy.
    • Build SOC skills in managing firewalls with pfSense, IDS/IPS with Snort, and network traffic analysis.
    • Learn to use SIEM tools like ELK and Splunk for event monitoring and alerting, and perform complex searches.
    • Gain experience in threat hunting using log analysis, filtering, and the MITRE ATT&CK framework for cyber threat detection and response.
    • Improve incident response skills by handling investigations, using YARA for threat detection, and conducting detailed cyber incident analyses.

    Course Syllabus:

    Chapter 01
    Windows Domain

    Windows Server

    • Installing Windows Server
    • Configuring Windows Server
    • Managing Features
    • Windows Events
    • Sysmon

    Windows Domain

    • Installing AD DS
    • Configuring AD DS
    • Managing Domain Protocols
    • Working with Group Policy
    • Working with Wireshark

    Firewalls

    • pfSense Installation
    • Configuring FW Rules
    • Configuring NAT Rules
    • Installing and Managing Packages
    • Real-Time Monitoring

    IDS/IPS

    • Working with Snort
    • Snort Rules Structure
    • Setting and Configuring Rules
    • Passing Traffic using the NAT Feature
    • Analyzing Advanced Rules
    Chapter 02
    SOC Environment
    Question text goes here
    • Become familiar with different attack scenarios

    ELK

    • Monitoring Events
    • Different Search Methods
    • Custom Queries
    • Setting Alerts

    Splunk

    • Monitoring with Splunk
    • Splunk Alerts
    Chapter 03
    Security Information and Event Management (SIEM) Systems
    Question text goes here
    • Become familiar with different attack scenarios

    Log Analysis

    • Analyzing Logs
    • Advanced Filtering

    MITRE ATT&CK

    • Hunting via Events
    • Creating Hunting Rules

    Sysmon

    • Configuring XML Settings
    • Analyzing Sysmon Events

    YARA

    • Rules Structure
    • Hunting with YARA

    Incident Response

    • IR Playbooks
    • Investigating Files
    Chapter 04
    Threat Hunting
    Question text goes here
    • Become familiar with different attack scenarios
    Chapter 05
    Question text goes here
    • Become familiar with different attack scenarios

    Training Schedule:

    Tailored To Client
    Question text goes here

    Training Methodology:

    Apprenticeship-based Training

    • Experience hands-on learning with our demonstration method on a virtual/host machine, ensuring immersive understanding.
    • Our trainers prioritise showing over telling, explaining intricacies without relying on slides, offering direct engagement.
    • Bridge your knowledge gap by connecting theoretical concepts to practical cybersecurity applications, enhancing career readiness.

    Practice Labs

    • Engage in repeated practice sessions to solidify and reinforce your understanding.
    • Delve deeper with practice questions, encouraging students to explore interconnected topics and enhance comprehension.
    • Stimulate critical thinking through challenge questions, prompting students to seek solutions and broaden their problem-solving abilities.

    Assessment and Project

    • Equip yourself with the expertise and tools essential for navigating corporate networks safely.
    • Gain a comprehensive understanding of cyber-attacks to fortify your digital environment effectively.
    • Broaden your horizon by familiarising yourself with diverse cyber-attack scenarios and their implications.
    Question text goes here
    • Become familiar with different attack scenarios

    FAQs:

    Question text goes here
    • Become familiar with different attack scenarios
    Quick Info
    Programme Fee
    Custom Pricing
    Duration
    5 Days
    Schedule
    Tailored To Client
    Teacher-to-Student Ratio
    1:30
    Delivery Mode
    Entry Requirement
    Schedule A Consultation
    View Course BrochureRegister NowBook Your SlotView Brochure

    Secure Your Future

    Find out more about how we can help you secure your future in cybersecurity

    Talk to us on
    WhatsApp!