SOC Analyst 1 Battle Path
Rated 3.5/5 based on 11 customer reviews

SOC Analyst 1 Battle Path

Available: In Stock
$250.00

Image

Course Overview

Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.

 

Objectives

This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.

Target Audience

Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.


  • Introduction to the SOC
  • Linux Syslog
  • Windows Event Logs
  • Understanding the Threat Landscape
  • Splunk: Basics
  • Splunk: Fields and Transforms
  • Malware Analysis Introduction
  • YARA: Overview
  • Email Header Analysis
  • Email URL Analysis
  • Wireshark Basics
  • Email Challenge
  • Introduction to RegEx
  • Recorded Future: Browser Extension
  • Splunk: Visualizations
  • YARA: Rule Generation
  • YARA: Rule Management
  • Splunk: Alerts
  • Suricata: Basics
  • YARA: Rule Writing
  • Threat Intel Challenge
  • Suricata: IDS Rules
  • Suricata: Rule Management
  • Windows: Procomon
  • Malware Analysis: VirusTotal
  • Privilege Escalation Introduction
  • Remote Code Execution Introduction
  • Pass the Hash
  • HLinux System Info Gathering
  • Regular Expressions: Basic

Course Overview

Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.

 

Objectives

This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.

Target Audience

Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.


  • Introduction to the SOC
  • Linux Syslog
  • Windows Event Logs
  • Understanding the Threat Landscape
  • Splunk: Basics
  • Splunk: Fields and Transforms
  • Malware Analysis Introduction
  • YARA: Overview
  • Email Header Analysis
  • Email URL Analysis
  • Wireshark Basics
  • Email Challenge
  • Introduction to RegEx
  • Recorded Future: Browser Extension
  • Splunk: Visualizations
  • YARA: Rule Generation
  • YARA: Rule Management
  • Splunk: Alerts
  • Suricata: Basics
  • YARA: Rule Writing
  • Threat Intel Challenge
  • Suricata: IDS Rules
  • Suricata: Rule Management
  • Windows: Procomon
  • Malware Analysis: VirusTotal
  • Privilege Escalation Introduction
  • Remote Code Execution Introduction
  • Pass the Hash
  • HLinux System Info Gathering
  • Regular Expressions: Basic