Security Operations Centre (SOC)

Security Operations Centre (SOC)

Course ID: QHA6160

Duration: 32 Hours

Certification Name: QHA Certified Security Operations Centre (SOC) Analyst

 20,060.00 (Inclusive of all taxes)


About Programme

A security operations centre (SOC) is a centralized unit capable of handling security issues that an enterprise may come across. This unit can operate as part of the enterprise IT security team or from a secure, remote location. The SOC employs multiple security devices and operations that work together to analyse and deal with security incidents. The SOC unit is driven by industry certified professionals which include seasoned and trained engineers. The Security Operations Centre (SOC) Analysis program puts together a wide variety of modules such as cyber threats, intelligence analysis, analytics and techniques employed to extract the right kind of information at the right time at a typical SOC setup.


Highlights of the programme

  1. Thorough understanding of Security Operations Centre (SOC)
  2. Master the analytical and technical skills required to work in any SOC
  3. Understand the security operations and its implications
  4. Know the roles and responsibilities within a SOC
  5. Get insights into Cyber threats, intelligence analysis, and analytics
  6. Learn typical security operations centre setup and working Certify your achievement Course Content


Programme Content

  • Security Overview & Architecture
  • SOC Roles & Responsibilities
  • Threat Landscape Over Internet
  • SIEM Use Cases by Runbook
  • SOC Incident Handling
  • Alert handling Procedures
  • Importance of Log Management
  • AlienVaultWorkshop Part 1
  • Log Collection & Correlation
  • Types of Attacks & Identify Attack Vector
  • Monitoring Alerts & Mitigation
  • AlienVaultWorkshop Part 2
  • Log Management, Cyber Threat Hunting and SIEM
  • Application Log Monitoring and Forensics
  • Operations, Fraud and Risk Analytics
  • DNIF Workshop

Certificate to highlight the knowledge and skills you gain

Official and Verified

Receive an instructor-signed certificate with the institution’s logo to verify your achievement and increase your job prospects

Easily Shareable

Add the certificate to your CV or resume, or post it directly on LinkedIn

Proven Motivator

Give yourself an additional incentive to complete the course

Additional Information


  • There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management. The course is designed for individuals responsible for defending organisations from cyber-attacks

Laptop Requirements

  • Processor – Intel i3 or above
  • RAM minimum – 4gb
  • HDD space minimum – 10GB
  • 1 Virtual machine configured with Kali Linux
  • Administrative Rights of the machine