SOC Analyst 2 Battle Path
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions' SOC Analyst 1 Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- AD Rights Management
- PCAP Forensics: Wireshark
- Suricata: IPS Rules
Module 2
- PCAP Forensics 2
- Visual Spoofing
- Basic Shell Scripting
Module 3
- PowerShell Basics 1
- Investigations with Wireshark
- Suricata Challenge
Module 4
- PowerShell Basics 2
- Active Directory GPO
- LOKI IOC Scanner
Module 5
- Linux Log Management: Systemd Journal
- Splunk: API
- Identifying Linux IOCs
Module 6
- Windows: Weak and Reused Creds
- Nikto
- Linux Security Investigation Challenge
Module 7
- Firewall Policies: FortiOS
- Lateral Movement Overview
- Greenbone Vulnerability Management
Module 8
- PowerShell Logging
- Splunk: Input Configuration
- Botnet Takedown Challenge
Module 9
- Windows NTLM
- Process Injection IR with Splunk
- CVE-2019-15107 WebMin Unathorized
Module 10
- OpenSCAP
- Sudo Killer
- Traffic Light Protocol Overview
Course Overview
Effective training is critical to any security professional’s success. With DiTech Solutions' SOC Analyst 1 Battle Path, you’ll have quick access to a multiweek training program designed to develop your security skills.
Objectives
This training takes place in a highly realistic cloud-based cyber range, featuring real IT infrastructure, real security tools, and real cyberattacks. As part of the Battle Path, you’ll complete training exercises and related challenges. Once you’ve finished the Battle Path, you’ll receive a RangeForce Badge to validate and promote your achievements.
Target Audience
Whether you’re just beginning your career in cybersecurity or are mastering new skills needed to advance it, each path provides impactful hands-on training to take your career to the next level. Purchase Battle Paths together with a Battle Skills license or individually to match your specific training goals.
Module 1
- AD Rights Management
- PCAP Forensics: Wireshark
- Suricata: IPS Rules
Module 2
- PCAP Forensics 2
- Visual Spoofing
- Basic Shell Scripting
Module 3
- PowerShell Basics 1
- Investigations with Wireshark
- Suricata Challenge
Module 4
- PowerShell Basics 2
- Active Directory GPO
- LOKI IOC Scanner
Module 5
- Linux Log Management: Systemd Journal
- Splunk: API
- Identifying Linux IOCs
Module 6
- Windows: Weak and Reused Creds
- Nikto
- Linux Security Investigation Challenge
Module 7
- Firewall Policies: FortiOS
- Lateral Movement Overview
- Greenbone Vulnerability Management
Module 8
- PowerShell Logging
- Splunk: Input Configuration
- Botnet Takedown Challenge
Module 9
- Windows NTLM
- Process Injection IR with Splunk
- CVE-2019-15107 WebMin Unathorized
Module 10
- OpenSCAP
- Sudo Killer
- Traffic Light Protocol Overview