10 Must-Have Skills for every SOC Analyst 1. Cyber Security Fundamentals a. CIA triad (confidentiality, integrity, availability) b. OSI model c. TCP/IP Packet Header d. Important protocols (http, https, dns, ftp, dhcp, imap, smtp) e. Cryptography (encryption, hashing, public key infrastructure) f. Types of cyber-attacks (Malwares, Web, dDos and phishing attacks) 2. Operating Systems a. Windows and Linux (dir, network settings, file editor, file system. b. Tools (VMware, virtual box and install linux) 3. Netwok Security a. Firewalls (stateful firewalls, NextGen firewall, web application firewalls) b. Intrusion detection system (IDS) c. Intrusion prevention system (IPS) d. Tools (Checkpoint, CISCO, Palo alto, FortiGate, pFsense, security onion (Suricata and zeek), snort a network ids) 4. Vulnerability Management a. Perform vulnerability scanning (routers, switches, firewalls, servers, web applications etc) b. Vulnerability assessment (Risk assessment) c. Priorities and address vulnerabilities (Remediation, mitigation, acceptance) d. Continoius vulnerability management e. Tools (Nmap, OpenVAS/GVM, Tenable, Qualys, Rapid7) 5. Incident Response a. Early detection b. Analysis (Review alerts, indicators of compromise (IoC), Triage the threat) c. Prioritization (impact of a security incident, Focus, Manage resources) d. Notification (intimate to the concern) e. Containment and forensics (Firewall logs, proxy logs, Wireshark capture) f. Recovery (Eradication, restoration from the backup or patch) g. Incident Review h. Incident response framework (SANS and NIST) i. Incident response automation (IR playbooks, tools integration (slack, MS teams, ServiceNow)) j. Threat intelligence (cyber kill chain, MITRE attack framework, TTP, IoC) k. Tools and Actions (Splunk, IBM QRadar, Elastic, ( MISP, Wazuh, shuffle and ansible are open source) 6. Phishing Analysis a. Type of Phishing attacks (Email, spear, whaling, smishing/vishing and Angler phishing) b. Email header analysis c. URL/IP Reputation check d. Whois domain lookup e. Tools (Virustotal.com, mailheader.org, IBM-Xforce, Checkphish) 7. Malware Analysis a. How the malware works b. What is the objective of the malware c. How to defeat or eliminate the malware d. Type of malware e. Static malware analysis f. Dynamic malware analysis g. Packers h. Sandbox environment i. Tools (Pestudio, Process monitor (shows the registry change), ProcDot, Process hacker, IDA Pro, Wireshark, Any run) 8. Digital Forensics a. Retrieving protected/encrypted data b. Analyzing network breaches c. Documenting case findings d. Collecting and analyzing network evidence (firewall log, proxy log, NetFlow, tcpdump packet capture, Wireshark packet capture) e. Acquiring and analyzing host-based evidence ( ram/rom memory, system storage) f. Malware Analysis g. Tools (Autopsy, FTP manager, Wireshark, Encase, Volatility, Registry viewer, HashCalc) 9. Security Frameworks and Compliance a. PCI DSS b. HIPPA c. GDPR d. SOX e. ISO 27001 f. NIST CSF 10. Workplace skills a. Communication b. Team work c. Critical Thinking
Thank you for the video(s) I have enjoyed them very much. I have recently graduated from Digital Crafts 4 month Cybersecurity, Boot Camp. I have 10 years of experience in NOC environments, as well as going through the process of Help Desk desktop support and getting into infrastructure and Junior system administration for the state of Colorado I have recently passed the Cyber Sec ISC2 and I am a full member as well as the CompTIA security plus cert. My only school background is approximately two years at Boston University in 1995 hoping to break into a SOC analyst position with the help of your videos. They speak to me in clear plain-text unencrypted 😊 I hope I have enough to get in the door. I was meant to do this, and now I have to prove myself. Thank you.
What a powerful and comprehensive details about SOC . Nobody gives this much information. You are genius and makes others to grow. No words to appreciate untiring and selfless knowledge sharing. Your good work light many lives.
Mind-blowing excellent information about soc analyst and cyber security, thankyou so much bro for doing such a great information video s, Please do more videos on cyber security domain .
New subscriber. Excellent presentation and concise information that is so hard to find in one place anywhere else. Definitely make that Threat Intelligence deep-dive video.
Hello Rajneesh am loving to follow u, your matterial is helping a lot of. Could u possible send me some interesting incident response tasks and trainings.?
You got me, great content, Now one question. Blue Cert 1 Blue cert 2 Has all this curriculum???? Or i have to learn and practice by myself from external open sources?
@@RajneeshCyber Hi bro i am interested in cyber security but not to go in coding and ctf the offensive side, so i am plan to move on defensive and leraning things like splunk,nessus is that a right choice? Plz guide me......
10 Must-Have Skills for every SOC Analyst
1. Cyber Security Fundamentals
a. CIA triad (confidentiality, integrity, availability)
b. OSI model
c. TCP/IP Packet Header
d. Important protocols (http, https, dns, ftp, dhcp, imap, smtp)
e. Cryptography (encryption, hashing, public key infrastructure)
f. Types of cyber-attacks (Malwares, Web, dDos and phishing attacks)
2. Operating Systems
a. Windows and Linux (dir, network settings, file editor, file system.
b. Tools (VMware, virtual box and install linux)
3. Netwok Security
a. Firewalls (stateful firewalls, NextGen firewall, web application firewalls)
b. Intrusion detection system (IDS)
c. Intrusion prevention system (IPS)
d. Tools (Checkpoint, CISCO, Palo alto, FortiGate, pFsense, security onion (Suricata
and zeek), snort a network ids)
4. Vulnerability Management
a. Perform vulnerability scanning (routers, switches, firewalls, servers, web
applications etc)
b. Vulnerability assessment (Risk assessment)
c. Priorities and address vulnerabilities (Remediation, mitigation, acceptance)
d. Continoius vulnerability management
e. Tools (Nmap, OpenVAS/GVM, Tenable, Qualys, Rapid7)
5. Incident Response
a. Early detection
b. Analysis (Review alerts, indicators of compromise (IoC), Triage the threat)
c. Prioritization (impact of a security incident, Focus, Manage resources)
d. Notification (intimate to the concern)
e. Containment and forensics (Firewall logs, proxy logs, Wireshark capture)
f. Recovery (Eradication, restoration from the backup or patch)
g. Incident Review
h. Incident response framework (SANS and NIST)
i. Incident response automation (IR playbooks, tools integration (slack, MS teams,
ServiceNow))
j. Threat intelligence (cyber kill chain, MITRE attack framework, TTP, IoC)
k. Tools and Actions (Splunk, IBM QRadar, Elastic, ( MISP, Wazuh, shuffle and
ansible are open source)
6. Phishing Analysis
a. Type of Phishing attacks (Email, spear, whaling, smishing/vishing and Angler
phishing)
b. Email header analysis
c. URL/IP Reputation check
d. Whois domain lookup
e. Tools (Virustotal.com, mailheader.org, IBM-Xforce, Checkphish)
7. Malware Analysis
a. How the malware works
b. What is the objective of the malware
c. How to defeat or eliminate the malware
d. Type of malware
e. Static malware analysis
f. Dynamic malware analysis
g. Packers
h. Sandbox environment
i. Tools (Pestudio, Process monitor (shows the registry change), ProcDot, Process
hacker, IDA Pro, Wireshark, Any run)
8. Digital Forensics
a. Retrieving protected/encrypted data
b. Analyzing network breaches
c. Documenting case findings
d. Collecting and analyzing network evidence (firewall log, proxy log, NetFlow,
tcpdump packet capture, Wireshark packet capture)
e. Acquiring and analyzing host-based evidence ( ram/rom memory, system
storage)
f. Malware Analysis
g. Tools (Autopsy, FTP manager, Wireshark, Encase, Volatility, Registry viewer,
HashCalc)
9. Security Frameworks and Compliance
a. PCI DSS
b. HIPPA
c. GDPR
d. SOX
e. ISO 27001
f. NIST CSF
10. Workplace skills
a. Communication
b. Team work
c. Critical Thinking
Thanks
Thanks 😊
Thank you so much bro
This is one of the best soc analyst videos I've seen yet. Very good work!
Thank you for the video(s) I have enjoyed them very much. I have recently graduated from Digital Crafts 4 month Cybersecurity, Boot Camp. I have 10 years of experience in NOC environments, as well as going through the process of Help Desk desktop support and getting into infrastructure and Junior system administration for the state of Colorado I have recently passed the Cyber Sec ISC2 and I am a full member as well as the CompTIA security plus cert. My only school background is approximately two years at Boston University in 1995 hoping to break into a SOC analyst position with the help of your videos. They speak to me in clear plain-text unencrypted 😊 I hope I have enough to get in the door. I was meant to do this, and now I have to prove myself. Thank you.
Thanks Bro!!!! For Roadmap Now I can learn step by step without missing anything
What a powerful and comprehensive details about SOC . Nobody gives this much information. You are genius and makes others to grow. No words to appreciate untiring and selfless knowledge sharing. Your good work light many lives.
Gajab bhayee,aapke jaisa guide karne wala ho to har student success ho jaayega,thank u sir Ji superb video cover all information
Hi bro, we want more videos related to SOC analyst.Thanks for sharing these important information.
Sure.
You Rock...Thank you so much for this detailed, informative, and encouraging video (tutorial).
Glad it was helpful!
the most comprehensive video there is on soc analyst skills!!
Great suggestions and outline of what a CSA needs to be effective in their role.
Mind-blowing excellent information about soc analyst and cyber security, thankyou so much bro for doing such a great information video s, Please do more videos on cyber security domain .
Awesome video I never had seen this type of valuable information. Thanks a lot to you😍. Please keep it up
New subscriber. Excellent presentation and concise information that is so hard to find in one place anywhere else. Definitely make that Threat Intelligence deep-dive video.
Super video .
yes i am looking separate video for threat intelligence
Very informative and interesting, thank you so much sir.
best video ever on roadmap
You are great, you made this so easy for me, Thank you.
thank you so much it is best roadmap for beginners i am just start learning soc analyst .
Did you get the job?
It would be helpful if you added SOC analyst training on RUclips as well.
Truly awesome very good information to prepare my soc interviews.
thank you very good work is that, please can you send explanation details of Wireshark tools ,
very interesting and well explained, thank you.
Please sir I am gaining more knowledge about your SOC analysist and i want more knowledge about Thread Intelligent
Well explained, thank for you explainetion
I Thank you for this video, this has helped clear some doubts. Kindly help with video on threat Intelligence .
What amongst the all contents should be valid for only L1 SOC analyst training ?
wow this looks like a lot, is there any structured course where I can learn all in a systematic way.
Hello Rajneesh am loving to follow u, your matterial is helping a lot of. Could u possible send me some interesting incident response tasks and trainings.?
this very good advice for SOC team
Thanks for breaking it down! Will like to connect with you discuss available package that can support me for my career development. Thank you
found good clarification after long search 👌
What are the tools and actions for Security Framework and Compliance.?
You didn't tell in the video. please mention. @Rajneesh Gupta
Sir please make an video data analyst
what is the entry level sa;ary for soc and how much we can expect for a experienced professional?
nice explanation
Suggest free plateform where we can learn all the things.or make course for it
Greats
Thanks for the video.
Thanks for the video good insight for a beginner. Do you have any training on these steps or the best place to go to learn?
Great video sir thank you🌹
Thank you 3000
can we have a complete video of a malware detection project with python. please
Noted
You got me, great content,
Now one question.
Blue Cert 1
Blue cert 2
Has all this curriculum????
Or i have to learn and practice by myself from external open sources?
Maybe On this video just talk about skills not cert ?
yes I've seen the blue team lv1 curriculum and it covers all these concepts. i
t's been 4 months since u asked, I guess u already started something ?
good one
i need a coach as a soc analyst please
Why Edr and xdr is not in the list?
Nice ❤❤❤❤❤
good teach
which firewall is good to start palo alto / pfsense
Palo Alto
Is the SOC course available I video format?
Yes
A lot to learn
Yeah. I understand but its worth it👍
Hi i want to be a cyber security what group i wanted to take in class 11
First- complete your degree
You can’t learn everything in one shot you have to learn by doing and too much practicing
Indeed
Bro u have covered entire CEH syllabus😂
Please provide us free resources to learn all these skills
Free? 😂
Does the field need coding to survive ?
Nope.
@@RajneeshCyber Hi bro i am interested in cyber security but not to go in coding and ctf the offensive side, so i am plan to move on defensive and leraning things like splunk,nessus is that a right choice?
Plz guide me......
Is your Soc ultimate course in English ?
Yup
@@RajneeshCyber Thank you very much I'll get it ..
🔥🔥🔥👍🏻
Does gap yr affect getting into soc from non tech
nope
These all skills are for level 1 SOC analyst
1 and 2
links ?
And the salary is 40k/year after all these.
No way dude 40k year, u are doing intern or job , coz if u are doing job then just take exp and go for good opportunity
In dollars ?