This course provides advanced, hands-on training in modern security operations, focusing on detecting, investigating, and responding to sophisticated cyber threats across enterprise and cloud environments. Learners will gain practical experience with threat intelligence, forensics, SIEM log correlation, SOAR automation, offensive and defensive techniques, cloud and container security, and Zero Trust practices. Designed for professionals working in or alongside Security Operations Centers (SOCs), the course prepares participants for threat hunting, incident response, and proactive defense.
Prerequisites
In order to succeed in this course, participants will need:
- Solid understanding of networking concepts (TCP/IP, protocols, common ports)
- Familiarity with Windows and Linux operating systems
- Knowledge of security fundamentals (threats, vulnerabilities, controls)
- Basic command-line proficiency in Linux
- Experience working with virtualized environments
Purpose
| Gain practical experience in modern security operations |
Audience
| IT professionals working in or alongside Security Operations Centers (SOC) |
Role
| SOC Analysts (Tier 1 & Tier 2) | Incident Response Analysts | Threat Hunters | Junior Penetration Testers | Network Secuirty Engineers | Cybersecurity Analysts |
Skill level
| Advanced |
Style
| Lecture | Hands-on Activites | Labs |
Duration
| 4 days |
Related technologies
| Cloud | Infrastructure as Code (IaC) | Docker | Kubernetes |
Â
Course objectives
- Analyze and apply threat intelligence
- Conduct practical network forensics
- Utilize a Security Information and Event Management (SIEM) system to correlate logs and detect security anomalies
- Understand and apply offensive security techniques
- Identify unique vulnerabilities and use of effective controls
- Implement security automation and orchestration to streamline incident response workflows