Home EC-Council Training CoursesEC-Council Certified SOC Analyst (CSA v2)

EC-Council Certified SOC Analyst (CSA v2)

Guaranteed to Run
Price
$2,097.00
Duration
3 Days
Delivery Methods
Virtual Instructor Led Private Group
Delivery
Virtual
EST
Description
Objectives
Prerequisites
Content
Course Description

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

As the security landscape is expanding, a SOC team offers high quality IT-security services to actively detect potential cyber threats/attacks and quickly respond to security incidents. Organizations need skilled SOC Analysts who can serve as the front-line defenders, warning other professionals of emerging and present cyber threats

Course Objectives
  • SOC Fundamentals – Understand the SOC workflow, including processes, procedures, technologies, and operational models.

  • Threat Intelligence – Identify, classify, and analyze security threats, attack vectors, attacker behaviors, and Indicators of Compromise (IoCs).

  • SIEM Management – Gain expertise in SIEM platforms: architecture, deployment, fine-tuning, and administration.

  • Log & Event Analysis – Collect, monitor, and analyze security events and logs using Centralized Log Management (CLM).

  • Threat Detection – Build hands-on skills in threat detection through SIEM use cases, correlation rules, and reporting.

  • Threat Hunting – Apply threat hunting frameworks and use tools such as PowerShell, Yara, and other utilities to detect emerging threats.

Who Should Attend?
  • SOC Tier 3 Analyst
  • SOC Security Analyst
  • SOC Analyst I
  • Cyber Security Analyst
  • Security Incident Response Analyst / SOC Analyst
  • Information Assurance Compliance Analyst
  • Junior SOC Analyst
  • Junior Program Analyst
  • Junior Program Analyst
  • SOC Tier 2 Analyst
  • Cyber Incident Response Analyst / SOC Analyst
  • Junior Monitoring Analyst
  • Security Analyst I
  • Jr. Vulnerability Analyst
  • Global Information Security SOC Team Lead
  • Program Analyst
Course Prerequisites
  • The candidate must have one year of work experience in the network administration or security domain. 

  • This work experience must be verifiable through the application process.

  • If the candidate attends official EC-Council training (through an accredited center or via EC-Council), the requirement to prove work experience may be waived

Course Content
Module 1: Security Operations and Management
Module 2: Understanding Cyber Threats, IoCs, and Attack Methodology
Module 3: Log Management
Module 4: Incident Detection and Triage
Module 5: Proactive Threat Detection
Module 6: Incident Response
Module 7: Forensics Investigation and Malware Analysis
Module 8: SOC for Cloud Environments
Do You Need Help? Please Fill Out The Form Below
First Name*
Last Name*
Business Email*
Phone Number*
What do you need assistance with?*
Best way to contact me*
How can we help you?*