SIEM (SOC Analyst) Course Index
Learn Security Information and Event Management (SIEM) from fundamentals to real-world SOC operations. This course covers log analysis, detection, incident response, threat hunting, and hands-on SOC workflows.
I. SIEM & SOC Fundamentals (8 Lessons)
II. Log Management & Detection (10 Lessons)
9. Log Collection and Normalization
10. Parsing and Field Extraction
11. Event Correlation Basics
12. Detection Logic and Rule Writing
13. Threshold vs Behavioral Detection
14. Alert Tuning and Noise Reduction
15. MITRE ATT&CK Framework Overview
16. Mapping Use Cases to MITRE
17. SIEM Dashboards and Visualizations
18. Detection Best Practices
III. Incident Response & SOC Operations (12 Lessons)
19. Alert Investigation Workflow
20. Incident Classification and Prioritization
21. False Positives and True Positives
22. Threat Intelligence Integration
23. IOC Management
24. Case Management in SOC
25. Incident Response Lifecycle
26. Containment and Mitigation Actions
27. Root Cause Analysis
28. Reporting and Documentation
29. SOC Metrics and KPIs
30. Shift Handover and Escalation
IV. SIEM Tools & Real-World Practice (10 Lessons)
31. SIEM Tools Overview
32. Splunk Fundamentals
33. Elastic SIEM Overview
34. Microsoft Sentinel Basics
35. Log Analysis Hands-On
36. Writing Real-World Detection Use Cases
37. Threat Hunting Basics
38. Automation and SOAR Introduction
39. SIEM Best Practices Checklist
40. Mini Project – SOC Investigation