SOC Level 2
Tryhackme Walkthrough
Skills needed as a SOC Analyst career
Security operations
Introductory incident response
Malware analysis
Threat hunting and threat emulation
LEVEL: HARD
Intro to logs
Logs operations
Intro to log analysis
Splunk: Exploring SPL
Splunk: Setting up a SOC Lab
Splunk: Dashboards and Reports
Splunk: Data Manipulation
Fixit
Logstash: Data Processing Unit
Custom Alert Rules in Wazuh
Advanced ELK Queries
Slingshot
Intro to Detection Engineering
Tactical Detection
Threat Intelligence for SOC
Sigma
SigHunt
Aurora EDR
SOAR
Threat hunting: Introduction
Threat hunting: Foothold
Threat hunting: Pivoting
Threat hunting: Endgame
Hunt Me I: Payment Collectors
Hunt Me II: Typo Squatters
Intro to Threat Emulation
Threat Modelling
Atomic Red Team
CALDERA
Atomic Bird goes Purple #1
Atomic Bird goes Purple #2
Preparation
Identification & Scoping
Threat Intel & Containment
Eradication & Remediation
Lessons Learned
Tasdigrade
x86 Architecture Overview
x86 Assembly Crash Course
Wndows Internals
Dissecting PE Headers
Basic Static Analysis
MalBuster
Advanced Static Analysis
Basic Dynamic Analysis
Dynamic Analysis: Debugging
Anti-Reverse Engineering
MalDoc: Static Analysis