0% found this document useful (0 votes)
159 views

SOC Analyst

Uploaded by

vadiraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views

SOC Analyst

Uploaded by

vadiraja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Chris Romano

SOC Analyst Academy

SOC Analyst
SKILLS FOR
SUCCESS
DEFENSIVE
Operating Systems CYBERSECURITY
WINDOWS / LINUX ANALYSIS / IDS & IPS / DLP /
SOC Analyst INCIDENT RESPONSE / SIEM /

Networking
CORE ANALYSIS
NETWORKING
COMMUNICATIONS
SKILLS PROTOTCOL ANALYSIS /
NETWORK EVENTS / ATTACK
ANALYSIS / MALWARE
DETECTION & RESPONSE /
OFFENSIVE INCIDENT RESPONSE
TECHNIQUES
OFFENSIVE TACTICS / CLOUD &
TECHNIQUES / PROCEDURES VIRTUALIZATION
CLOUD SECURITY /
VIRTUALIZATION /
CONTAINERIZATION
Let’s Explor e
The Core
Skills
OPERATING 1 Windows Users / Groups

SY STEMS Directories

Permissions

SOC Analysts should be familiar with the functionality, GPOs


configuration, and security of Operating Systems.
2 Linux Kernel

Knowledge of Windows and Linux Users / Groups

Services
An understanding of how to secure Windows and Linux
Directories
is important along with knowledge of what Operating
Permissions
System components are targeted by attackers.
Networking
Networks allow communications, so
SOC Analysts need to understand:

Network Design and Layers

Protocols

How To Identify Network Attacks

Traffic Attack Patterns


IVE TACTICS PROCEDURES
OFFENS THE STRATEGIES ATTACKERS USE
UNDERSTAND THE PROCESSES
TO ACHIEVE THEIR OBJECTIVES
TTPS USED TO IMPLEMENT TECHNIQUES

RISK /
TECHNIQUES THREATS
IDENTIFY RISKS AND THREATS TO
THE METHODS AND ACTIONS
PROTECT
ATTACKERS USE TO EXECUTE
TACTICS
Know what to look for
and how to respond!
DEFENSIVE
CYBER S E C U R I T Y
DETECT
Analyze a RECOVER
nd Identif
Network a
nd Event
y Attacks
Through DEFEND Obtain
IDS / IPS Analysis: I
Create oCs
t tack:
SIEM P An A D
Updat etection R
T o STO e Conf ules
DLP A c t io n Restor igurat
FILE/URL A Take tacks e Data ions
nalyzers o c k A t Monito
ANTI-MAL Bl t ion s r
c
WARE STOP A Spread s
e ve n t g at ion
Pr t M iti
p le m en
Im
Analyze Network
Traffic Patterns To
Identify Suspicious
Behavior
ANALYSIS SKILLS Identify Malware To
Prevent Infections

Network Malware Detect Malicious


Analyze Protocols To Traffic Traffic And Stop
Identify Anomalies Attacks

Protocols Detection
Identify And Respond
Recognize Attacks to To Incidents And Stop
Alert and Respond Attacks

Attacks
Response
Cloud & Virtualization
MONITOR & PROTECT SERVICES IaaS PaaS SaaS
1 Understand How To Protect Cloud
Services
2 Monitor Cloud Service Access Infrastructure As A Service - IaaS: Enforce access
controls, patch, and implement network segmentation.
3 Secure Cloud Networks
Platform as a Service (PaaS): Use strict access controls,
encryption for data at rest and in transit, and monitor
4 Monitor Cloud Events logs.

5 Monitor Compliance Requirements Software as a Service (SaaS): Use strong


authentication protocols, encryption, security audits,
and compliance checks.
K e y
Sk i l l s The Skills For Success:
1. Operating Systems
2. Networking
3. Defensive TTPs
4. Defensive
Cybersecurity
5. Cloud & Virtualization
SKILLS FOR SUCCESS GAIN YOUR SKILLS

Opera
ting
Syste

?
rking ms
wo
Net

Defens iv e
s ec urity
Cyber
Cloud &
ualization Do You Have The
Virt
Skills
Offensive
Needed For Success?
TTPs
NEW TO CYB E R S E C U R I T Y ?

KNOWLEDGE SKILLS JOB


Learn The Areas To Develop Your Develop Your Skills Through Land your job:
Professional Skills. Real-World Based Projects. Resume
Interview Like A Pro
Create Your Professional Network.
READY TO GET
YOUR SKILLS AND
BEGIN YOUR
CAREER?
Click To Sign Up For My FREE SOC Analyst Career Training

You might also like