PwC Luxembourg and SECO-Institute join their forces!
Associate SOC Analyst offers a comprehensive 3- day training that immerses you into the processes, data flows and capabilities of a SOC along with hands on, real-world tasks of a Tier 1 Analyst.
Throughout the course you’ll work with SIEM, ITSM and a SOC Ticketing System, the key toolset of the SOC Analyst. You’ll practice attacker techniques and vulnerabilities evaluation and identify companies’ critical assets & key IT systems that you are assigned to monitor and protect. You will monitor, analyse and prioritize SIEM alerts and perform triage and effective decision making to confirm and declare if a security incident is taking place. You’ll use the ticketing system to report and present your findings, and manage an incident from preparation to post-incident analysis.
One of the most important takeaways from this course is understanding the 'Analyst Mindset': This training will trigger your curiosity, activate your analytical brain and have you work together with your SOC Mates, Clients and Incident Responders. We’ll dive deep into the analytical process and offer you a set of hypotheses with 'if- then' scenario's, what to look for and where to find 'go- to' resources to support your investigations. You’ll learn how to deal with the huge number of logs, alerts and events in a SOC, which can be overwhelming if not treated correctly.
The course delivers a simulated SOC environment including a virtualized ITSM, SOC Ticketing system and SIEM, fully set up to work together which will create an immersive experience and re-create your workplace environment as closely as possible.
Included in your training:
Price: 1950.00 €
Duration: 21h
Language: English
Number of participants: 20
By the end of this course, participants will:
From Mindset to Toolset
Module 1. The SOC and the Associate SOC Analyst
This module introduces students into the processes, data flows and capabilities of a Security Operations Center, the services that a SOC delivers, what technologies are deployed and how they interconnect. It then describes the different roles, responsibilities and tasks within the SOC, from Tier 1 up to management. From thereon, the module dives deep into the Tier 1 Analyst role, the associated Tasks and KSA matrix (Knowledge, Skills, Abilities) that are required, key tools and resources, major challenges and pitfalls for an Associate Analyst, and how all of the above are addressed in the training
1.1. Introduction to the Security Operations Center
1.2. Core tasks & skillset of the Associate Analyst, it is all about:
1.3. Key toolset of the Associate SOC Analyst (intro)
1.4. Key data-sources initiating investigations
1.5. Key data-sources supporting investigations
Module 2. Key toolset of the Associate SOC Analyst
This hands on module introduces students to SIEM, ITSM and SOC Ticketing Systems and how they work together. They will understand the different SIEM technologies and data processing models, focusing on Elastic and Splunk, the most popular SIEM products in the market nowadays. Students will experience the Analyst feeling when working with different team members and transitioning from the ITSM to the rest of the tools in order to deliver a high quality service. Throughout this module, students will work on a business case, where they are assigned to process some tasks within a virtual SOC via a ticketing system. They will be introduced to the mindset of the security analyst and the analytical, step- by step process of an investigation.
2.1. Introduction to SECO’s Virtual SOC
Get your Hands Dirty
Module 3. Log Collection, Use Cases, Threat Detection and Monitoring
This module delivers the theory behind log monitoring and security monitoring systems along with hands-on exercises in security logging and analysing log collections. The module offers an introduction to attacker techniques and vulnerability finding, critical assets and key systems identification. Students will learn where and how to collect data (SIEM alerts, IDS alerts, firewalls, network traffic logs, endpoints, WAF, etc), how to investigate and detect threats based on a large realistic dataset and how use cases are applied to monitor the use of attack techniques. A large portion of the module is again spent on guiding students step by step through the analytical process, what to look for when analysing log collections and key data sources that will support their investigations.
3.1. The mindset of a Security Analyst - in depth
3.2. Introduction to Attacker techniques and processes
3.3. Data Collection:
3.4. Logs and Log Collection
3.5. Critical and Key IT Systems and their logs (exercise)
3.6. ITSM and SIEM (Hands on)
3.7. Event Analysis, correlation & Attack Techniques (hands on)
3.8. Alerting, Reporting and Dashboarding (hands on)
3.9. Security Monitoring Use Cases, MaGMA, MaGMA UCF
Take a Deep Dive
Module 4. Threat Analysis in-depth, fundamentals of Threat Intelligence and Threat Hunting, Incident Response
Module 4 starts with a high- level introduction of the threat intelligence process and how it is applied to obtain situational awareness. It then dives deeper into the Pyramid of Pain and MITRE ATT&CK framework for Threat Hunting and Threat Analysis purposes. Next up we’ll dive deep into threat analysis and investigations, moving from Event-Analysis to Threat Analysis and bringing the analyst mindset covered throughout the course into a hands-on practice. Students will finalise understanding the incident declaration and escalation procedure as well as the overall Incident Response model and process. During the hands-on practice, students get to analyse a dataset to find indications of threats and work together on a business where they manage an incident from preparation to post-incident analysis. The hands-on section prepares students for a complex homework assignment they will complete after this module and that will be a part of their exam.
4.1. Introduction to Threat Intelligence, situational awareness and attribution
4.2. Pyramid of Pain and MITRE ATT&CK framework
4.3. Threat Hunting introduction
4.4. Threat Analysis in- depth
4.5. Detection continuous improvement and Intelligence feedback
4.6. Incident Response model and process
4.7. Hands on threat analysis exercise and incident response business case
4.8. Homework assignment and exam preparation
Exam
This training prepares for the Associate SOC Analyst certification from SECO-Institute. To obtain and claim your certification, you must successfully take 2 exams:
1. Practical Exam: Homework assignment in SECO’s Virtual SOC
The hands-on section on the last day of training prepares you for a complex, hands on homework assignment in SECO’s Virtual SOC that will be part of your exam and certification. You must finalize your assignment before you can schedule your exam.
2. Theory Exam
Target audience
This training benefits aspiring and early career SOC Analysts looking for in-depth, practical experience in a realistic work environment and obtain a certification as a SOC Analyst. Enterprise SOC Teams and Managed Service Providers have set this certification as a baseline for their SOC Analysts, and help them accelerate their learning curve and further progress their career in Security Operations.
Koen Maris is Partner at PwC Luxembourg, leading the Cyber Security practice with more than 20 years of experience in Information / Cyber security in cross industry environments.
Koen is specialised in Secure Operations Centers, incident response and awareness raising at all levels of an organisation. He has experience with Distributed Ledger Technology, IoT, OT/IT security, threat intelligence and forensics.
Koen has a strong technical background and operational experience in cyber security as well as strong competencies in security architecture, solution design, program management, business development.