Currently Empty: $0.00
Become a Certified SOC Essentials S|CE
EC-Council SOC Essentials S|CE
Course Overview
The SOC Essentials (S|CE) Series is designed for security professionals and freshers to enhance their skills and knowledge about essential security technologies. Focused on honing candidates with in-demand skills, the S|CE course will provide insights into security operations frameworks and related technologies that are required to master the foundational concepts of SOC.
In this program students will learn the basics of computer networks, TCP/IP model, OSI model, Windows/Linux/Unix security concepts, threats, vulnerabilities, and attack concepts in terms of cyber threats. Further, students will go through the complete SOC architecture: its importance, workflow, and processes of SOC.
Students will learn more advanced architectural concepts like SIEM architecture and deployment models, and data sources that are commonly used. Learn everything about Log Management like; dashboards, reports, and incident escalation in terms of dealing with real positive and false alerts. This course will also teach you sources, types, and lifecycle of threat intelligence and give an introduction to threat hunting as well while diving deep into incident response lifecycle processes. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. If you are looking to learn advanced SOC certification, click here: Certified SOC Analyst (C|SA)
EC-Council SOC Essentials Program Information
Who is it for?
What Skills You’ll Learn
Exam Details
Key Features
Brochure
Who is it for?
• School students, graduates, professionals, career starters and changers, IT / Technology / Cybersecurity teams with little or no work experience.
• Anyone who wants to start a career in cybersecurity and is interested in SOC.
• This course is also helpful for IT professionals, SOC analysts, system security professionals, security engineers, threat management professionals, incident response teams, security administrators, vulnerability management professionals, and any cybersecurity professional.
What Skills You’ll Learn
• Learn the basics of computer networks
• Dive deep into the cyber threat concepts like threats, vulnerabilities, and attacks.
• Gain insights into the Security Operations Center (SOC) architecture and learn the importance, workflow, and processes of SOC.
• Understand advanced architectural concepts like SIEM architecture and deployment models.
• Learn what log management is and its key parts, like events, logs, and incidents.
• Learn how you can perform centralized management of logs.
• Gain knowledge on dashboards, reports, and incident escalation in terms of dealing with real positive and false alerts.
• Discover the sources, types, and lifecycle of threat intelligence and get introduced to threat hunting.
• Deep dive into the Incident response lifecycle.
Exam Details
Training Details: Self-paced in-demand lecture videos led by world-class instructors and hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required
- Exam Code: 112-56
- Number of Questions: 75
- Exam Availability: EC-Council Exam Portal
- Test Duration: 2 hours
- Test Format: Multiple Choice
Key Features
• Engage in 6 lab practical exercises in every module to develop skills and understand how to secure cloud solutions.
• Get access to 10+ hours of premium self-paced video training.
• 900+ pages of ecourseware.
• Capstone Projects with Real-World CTF Challenges
• Gain year-long access to courseware and 6-month access to labs.
• Receive a proctored exam voucher with one-year validity.
• Increase your value in the job market to advance your career.
• Earn a globally recognized EC-Council certification.
• Learn about network fundamentals, Windows and Unix/Linux Security, exploits, SOC architecture, SIEM development, and threat hunting.
• Understand how to deal with alerts.
Brochure
Why EC-Council’s Essentials Series is the Most Popular and Fastest Growing Beginner Level Training Program for Career Starters and Career Changers
213,000+
Learners
Trust EC-Council’s
Essentials Series
150+
Countries
85+
Million Minutes
Watched
4.95/5.0
Average
Ratings
96.46%
of Learners
Gave a 5* Rating
EC-Council SOC Essentials
Course Outline
Module 1: Computer Network and Security Fundamentals
Topics covered:
• TCP/IP Model
• OSI Model
• Types of a Network
• Network Topologies
• Network Hardware Components
• TCP/IP Protocol Suite
• Network Security Controls
• Network Security Devices
• Windows Security
• Unix/Linux Security
• Web Application Fundamentals
• Information Security Standards, Laws, and Acts
Module 2: Fundamentals of Cyber Threats
Topics covered:
• Cyber Threats
• Intent-Motive-Goal
• Tactics-Techniques-Procedures
• Opportunity-Vulnerability-Weakness
• Vulnerability
• Threats & Attacks
• Example of Attacks
• Network-Based Attacks
• Application-Based Attacks
• Host-Based Attacks
• Insider Attacks
• Malware
• Phishing and Social Engineering
Module 3: Introduction to Security Operations Center
Topics covered:
• What is a Security Operations Center (SOC)
• Importance of SOC
• SOC Team Roles and Responsibilities
• SOC KPI
• SOC Metrics
• SOC Maturity Models
• SOC Workflow and Processes
• Challenges in Operating a SOC
Module 4: SOC Components and Architecture
Topics covered:
• Key Components of a SOC
• People in SOC
• Process in SOC
• Technologies in SOC
• SOC Architecture and Infrastructure
• Different Types of SOCs and Their Purposes
• Introduction to SIEM
• SIEM Architecture
• SIEM Deployment Models
• Data Sources in SIEM
• SIEM Logs
• Network in SIEM
• Endpoint Data in SIEM
Module 5: Introduction to Log Management
Topics covered:
• Incident
• Event
• Log
• Typical Log Sources
• Need of Log
• Typical Log Format
• Local Log Management
• Centralized Log Management
• Logging Best Practices
• Logging/Log Management Tools
Module 6: Incident Detection and Analysis
Topics covered:
• SIEM Use Case Development
• Security Monitoring and Analysis
• Correlation Rules
• Dashboards
• Reports
• Alerting
• Triaging Alerts
• Dealing with False Positives Alerts
• Incident Escalation
• Communication Paths
• Ticketing Systems
Module 7: Threat Intelligence and Hunting
Topics covered:
• Introduction to Threat Intelligence
• Threat Intelligence Sources
• Threat Intelligence Types
• Threat Intelligence Lifecycle
• Role of Threat Intelligence in SOC Operations
• Threat Intelligence Feeds
• Threat Intelligence Sharing and Collaboration
• Threat Intelligence Tools/Platforms
• Introduction to Threat Hunting
• Threat Hunting Techniques
• Threat Hunting Methodologies
• Role of Threat Hunting in SOC Operations
• Leveraging Threat Intelligence for Hunting
• Threat Hunting Tools
Module 8: Incident Response and Handling
Topics covered:
• Incident Handling Process
• Incident Classification and Prioritization
• Incident Response Lifecycle
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Post-incident Analysis and Reporting