Master the CSSIH curriculum: a comprehensive dive into SOC operations, SIEM tools, and threat detection, culminating in a 12-hour hands-on capstone project.
Master Security Operations Center (SOC) workflows, components, and alert triage processes.
Gain hands-on experience with industry-leading SIEM and log management tools like Splunk, Wazuh, and the ELK Stack.
Learn to investigate incidents, detect threats in real-time, and respond effectively to cyber attacks.
Understand the OSI Model, common network layer attacks, and execute advanced queries using Osquery.
Learn Splunk, Wazuh, ELK Stack, Log360, Osquery, and Paper Trail in a single unified program.
Engage in practical SSH Log Analysis, Web Log Analysis, and Cloudflare WAF Analysis.
Understand the Cyber Kill Chain and how to detect anomalies using real-time monitoring strategies.
Deploy agents, configure pipelines (Logstash), and build interactive visualization dashboards (Kibana).
Click modules to expand details
Learn the fundamentals of Security Operations Centers, including workflows, monitoring, and incident response.
Understand the OSI model, common protocols, and layer-specific cyber attacks, alongside the Cyber Kill Chain.
Master Splunk installation, components, and real-time monitoring using Search Processing Language (SPL).
Explore Wazuh history, components, and deployment types for effective host-based intrusion detection.
Learn about Papertrail overview and real-time cloud log management capabilities.
Understand the concept of treating your operating system as a database using SQL-based system querying.
Get hands-on with Elasticsearch, Logstash, and Kibana to ingest, parse, and visualize large volumes of data.
Learn Log360 installation, agent deployment, and establishing alert mechanisms.
Mapped to Security Operations Job Roles