Become a Certified SOC Essentials S|CE

EC-Council SOC Essentials S|CE

Course Overview

The SOC Essentials (S|CE) Series is designed for security professionals and freshers to enhance their skills and knowledge about essential security technologies. Focused on honing candidates with in-demand skills, the S|CE course will provide insights into security operations frameworks and related technologies that are required to master the foundational concepts of SOC.

In this program students will learn the basics of computer networks, TCP/IP model, OSI model, Windows/Linux/Unix security concepts, threats, vulnerabilities, and attack concepts in terms of cyber threats. Further, students will go through the complete SOC architecture: its importance, workflow, and processes of SOC.

Students will learn more advanced architectural concepts like SIEM architecture and deployment models, and data sources that are commonly used. Learn everything about Log Management like; dashboards, reports, and incident escalation in terms of dealing with real positive and false alerts. This course will also teach you sources, types, and lifecycle of threat intelligence and give an introduction to threat hunting as well while diving deep into incident response lifecycle processes. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role. If you are looking to learn advanced SOC certification, click here: Certified SOC Analyst (C|SA)

EC-Council SOC Essentials Program Information

Why EC-Council’s Essentials Series is the Most Popular and Fastest Growing Beginner Level Training Program for Career Starters and Career Changers

213,000+

Learners
Trust EC-Council’s
Essentials Series

150+

Countries

85+

Million Minutes
Watched

4.95/5.0

Average
Ratings

96.46%

of Learners
Gave a 5* Rating

EC-Council SOC Essentials
Course Outline

Module 1: Computer Network and Security Fundamentals

Topics covered:
• TCP/IP Model
• OSI Model
• Types of a Network
• Network Topologies
• Network Hardware Components
• TCP/IP Protocol Suite
• Network Security Controls
• Network Security Devices
• Windows Security
• Unix/Linux Security
• Web Application Fundamentals
• Information Security Standards, Laws, and Acts

Module 2: Fundamentals of Cyber Threats

Topics covered:
• Cyber Threats
• Intent-Motive-Goal
• Tactics-Techniques-Procedures
• Opportunity-Vulnerability-Weakness
• Vulnerability
• Threats & Attacks
• Example of Attacks
• Network-Based Attacks
• Application-Based Attacks
• Host-Based Attacks
• Insider Attacks
• Malware
• Phishing and Social Engineering

Module 3: Introduction to Security Operations Center

Topics covered:
• What is a Security Operations Center (SOC)
• Importance of SOC
• SOC Team Roles and Responsibilities
• SOC KPI
• SOC Metrics
• SOC Maturity Models
• SOC Workflow and Processes
• Challenges in Operating a SOC

Module 4: SOC Components and Architecture

Topics covered:
• Key Components of a SOC
• People in SOC
• Process in SOC
• Technologies in SOC
• SOC Architecture and Infrastructure
• Different Types of SOCs and Their Purposes
• Introduction to SIEM
• SIEM Architecture
• SIEM Deployment Models
• Data Sources in SIEM
• SIEM Logs
• Network in SIEM
• Endpoint Data in SIEM

Module 5: Introduction to Log Management

Topics covered:
• Incident
• Event
• Log
• Typical Log Sources
• Need of Log
• Typical Log Format
• Local Log Management
• Centralized Log Management
• Logging Best Practices
• Logging/Log Management Tools

Module 6: Incident Detection and Analysis

Topics covered:
• SIEM Use Case Development
• Security Monitoring and Analysis
• Correlation Rules
• Dashboards
• Reports
• Alerting
• Triaging Alerts
• Dealing with False Positives Alerts
• Incident Escalation
• Communication Paths
• Ticketing Systems

Module 7: Threat Intelligence and Hunting

Topics covered:
• Introduction to Threat Intelligence
• Threat Intelligence Sources
• Threat Intelligence Types
• Threat Intelligence Lifecycle
• Role of Threat Intelligence in SOC Operations
• Threat Intelligence Feeds
• Threat Intelligence Sharing and Collaboration
• Threat Intelligence Tools/Platforms
• Introduction to Threat Hunting
• Threat Hunting Techniques
• Threat Hunting Methodologies
• Role of Threat Hunting in SOC Operations
• Leveraging Threat Intelligence for Hunting
• Threat Hunting Tools

Module 8: Incident Response and Handling

Topics covered:
• Incident Handling Process
• Incident Classification and Prioritization
• Incident Response Lifecycle
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Post-incident Analysis and Reporting