SOC Analyst 1 Battle Path
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Introduction to the SOC
- Linux Syslog
- Windows Event Logs
Module 2
- Understanding the Threat Landscape
- Splunk: Basics
- Splunk: Fields and Transforms
Module 3
- Malware Analysis Introduction
- YARA: Overview
- Email Header Analysis
Module 4
- Email URL Analysis
- Wireshark Basics
- Email Challenge
Module 5
- Introduction to RegEx
- Recorded Future: Browser Extension
- Splunk: Visualizations
Module 6
- YARA: Rule Generation
- YARA: Rule Management
- Splunk: Alerts
Module 7
- Suricata: Basics
- YARA: Rule Writing
- Threat Intel Challenge
Module 8
- Suricata: IDS Rules
- Suricata: Rule Management
- Windows: Procomon
Module 9
- Malware Analysis: VirusTotal
- Privilege Escalation Introduction
- Remote Code Execution Introduction
Module 10
- Pass the Hash
- HLinux System Info Gathering
- Regular Expressions: Basic
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions’ Threat Hunter Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- Introduction to the SOC
- Linux Syslog
- Windows Event Logs
Module 2
- Understanding the Threat Landscape
- Splunk: Basics
- Splunk: Fields and Transforms
Module 3
- Malware Analysis Introduction
- YARA: Overview
- Email Header Analysis
Module 4
- Email URL Analysis
- Wireshark Basics
- Email Challenge
Module 5
- Introduction to RegEx
- Recorded Future: Browser Extension
- Splunk: Visualizations
Module 6
- YARA: Rule Generation
- YARA: Rule Management
- Splunk: Alerts
Module 7
- Suricata: Basics
- YARA: Rule Writing
- Threat Intel Challenge
Module 8
- Suricata: IDS Rules
- Suricata: Rule Management
- Windows: Procomon
Module 9
- Malware Analysis: VirusTotal
- Privilege Escalation Introduction
- Remote Code Execution Introduction
Module 10
- Pass the Hash
- HLinux System Info Gathering
- Regular Expressions: Basic