Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out

Advanced Security Operations

Course Summary

This course provides advanced, hands-on training in modern security operations, focusing on detecting, investigating, and responding to sophisticated cyber threats across enterprise and cloud environments. Learners will gain practical experience with threat intelligence, forensics, SIEM log correlation, SOAR automation, offensive and defensive techniques, cloud and container security, and Zero Trust practices. Designed for professionals working in or alongside Security Operations Centers (SOCs), the course prepares participants for threat hunting, incident response, and proactive defense.

Prerequisites
In order to succeed in this course, participants will need:

  • Solid understanding of networking concepts (TCP/IP, protocols, common ports)
  • Familiarity with Windows and Linux operating systems
  • Knowledge of security fundamentals (threats, vulnerabilities, controls)
  • Basic command-line proficiency in Linux
  • Experience working with virtualized environments
Purpose
Gain practical experience in modern security operations
Audience
IT professionals working in or alongside Security Operations Centers (SOC)
Role
SOC Analysts (Tier 1 & Tier 2) | Incident Response Analysts | Threat Hunters | Junior Penetration Testers | Network Secuirty Engineers | Cybersecurity Analysts
Skill level
Advanced
Style
Lecture | Hands-on Activites | Labs
Duration
4 days
Related technologies
Cloud | Infrastructure as Code (IaC) | Docker | Kubernetes

 

Course objectives
  • Analyze and apply threat intelligence
  • Conduct practical network forensics
  • Utilize a Security Information and Event Management (SIEM) system to correlate logs and detect security anomalies
  • Understand and apply offensive security techniques
  • Identify unique vulnerabilities and use of effective controls
  • Implement security automation and orchestration to streamline incident response workflows

What you'll learn:

In this Advanced Security  Operations course, you'll learn:

Threat Intelligence and Analysis

  • Advanced threat actors and campaigns
  • Open-source intelligence (OSINT) and commercial threat feeds
  • Threat modeling methodologies (MITRE ATT&CK, STRIDE, DREAD)
  • Malware analysis fundamentals

Network and Endpoint Forensics

  • Deep packet analysis with Wireshark and tcpdump
  • Acquiring and analyzing volatile memory
  • Disk imaging and analysis
  • Establishing chain of custody
  • Log analysis and correlation with SIEM platforms
  • Using and developing incident playbooks

Offensive and Defensive Security Techniques

  • Penetration testing methodologies
  • Building and operating a vulnerability management program
  • Advanced attacker evasion techniques
  • Fileless malware
  • Living-off-the-land binaries (LOLBins)
  • Defensive countermeasures and detection strategies
  • Leveraging SOAR platforms to streamline security operations

Cloud and Container Security

  • Cloud-native attack vectors and detection
  • Infrastructure as Code (IaC) security and DevSecOps integration
  • Securing containerized environments
  • Zero Trust architecture in hybrid cloud environments

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.