SOC Level 2
Tryhackme Walkthrough
Skills needed as a SOC Analyst career
Security operations
Introductory incident response
Malware analysis
Threat hunting and threat emulation
LEVEL: HARD
Intro to logs
Logs operations
Intro to log analysis
Splunk: Exploring SPL
Splunk: Setting up a SOC Lab
Splunk: Dashboards and Reports
Splunk: Data Manipulation
Fixit
Logstash: Data Processing Unit
Custom Alert Rules in Wazuh
Advanced ELK Queries
Slingshot
Intro to Detection Engineering
Tactical Detection
Threat Intelligence for SOC
Sigma
SigHunt
Aurora EDR
SOAR
Threat hunting: Introduction
Threat hunting: Foothold
Threat hunting: Pivoting
Threat hunting: Endgame
Hunt Me I: Payment Collectors
Hunt Me II: Typo Squatters
Intro to Threat Emulation
Threat Modelling
Atomic Red Team
CALDERA
Atomic Bird goes Purple #1
Atomic Bird goes Purple #2
Phishing Analysis Fundamentals
Phishing Emails in Action
Phishing Analysis Tools
Phishing Prevention
The Greenholt Phish