Mastering SOC: Security Operation Center

120+ Hours Live Class

🚀 Mastering SOC – বাংলাদেশের সবচেয়ে বড় সিকিউরিটি অপারেশন সেন্টার (SOC) কোর্স!
৪ মাসে মোট ১২০ ঘণ্টার সম্পূর্ণ কোর্স, যেখানে একদম শুরু থেকে শিখবেন কীভাবে একজন দক্ষ SOC Analyst হবেন।
🛡️ হাতেকলমে প্র্যাকটিক্যাল ট্রেনিং, রিয়েল-লাইফ টুলস আর ইন্ডাস্ট্রি স্ট্যান্ডার্ড সিলেবাসে সাজানো হয়েছে পুরো কোর্স।
👨‍💻 IT বা Non-IT – যেকোনো ব্যাকগ্রাউন্ড থেকে শুরু করা যাবে সহজেই।
🎓 কোর্স শেষে পাবেন সার্টিফিকেট, জব রেডি স্কিলস আর সাপোর্টিভ কমিউনিটি।

Course Overview and Benefits

Your Questions Answered

You’ll learn SOC fundamentals, threat detection, incident response, and how to use tools like SIEM to monitor and secure systems effectively.

Basic IT or cybersecurity knowledge is helpful, but the course starts with foundational skills, making it suitable for beginners and intermediates.

The course spans 96 hours, typically spread over weeks or months, depending on your pace and schedule.

Yes, the course includes practical labs to simulate real-world SOC scenarios, helping you apply skills like threat analysis and response.

Absolutely, it equips you with job-ready skills and knowledge for roles like SOC analyst, including certification prep and operational expertise.

Course Modules

Phase 1: Fundamentals

Week 1: Networking Essentials

What You’ll Learn:
  1. Understand the OSI Model and its layers.
  2. Dive into TCP/IP architecture, IP addressing, and subnetting.
  3. Explore key protocols like HTTP, DNS, FTP, and SMTP.
  4. Learn how to capture and analyze network traffic using Wireshark.
Hands-On Activities:
  1.  Install Wireshark and capture live network traffic.
  2. Analyze HTTP and DNS packets to understand their structure.
  3. Practice subnetting exercises to divide IP ranges efficiently.

 

Tools You’ll Use:
  1. Free & Open Source: Wireshark, Nmap, tcpdump.
  2.  Proprietary: SolarWinds Network Performance Monitor.

Week 2: Networking Advanced Fundamentals

What You’ll Learn:
  1. Configure VLANs for network segmentation.
  2. Set up VPNs for secure remote access.
  3. Understand routing protocols like OSPF and BGP.
  4.  Explore NAT and firewall configurations.
  5. Learn about wireless security (WPA2, WEP) and best practices.
Hands-On Activities:
  1. Use Cisco Packet Tracer or GNS3 to configure VLANs and routing.
  2. Set up a VPN using OpenVPN.
  3. Configure a firewall using pfSense.
Tools You’ll Use:
  1. Free & Open Source: OpenVPN, pfSense, VyOS.
  2. Proprietary: Cisco Packet Tracer, FortiGate.

Week 3: Linux Fundamentals

What You’ll Learn:
  1. Navigate the Linux directory structure (/bin, /etc, /var, etc.).
  2. Master essential commands like ls, cd, grep, and awk.
  3. Manage file permissions and processes.
  4. Write basic Bash scripts to automate tasks.
Hands-On Activities:
  1. Install Ubuntu or CentOS in a virtual machine.
  2. Write a Bash script to automate file backups.
  3. Practice managing file permissions and processes.
Tools You’ll Use:
  1. Free & Open Source: Ubuntu, CentOS, Fedora, Nano/Vi.
  2. Proprietary: Red Hat Enterprise Linux (RHEL), SUSE Linux.

Week 4: Linux System Administration

What You’ll Learn:
  1. Manage users and groups on a Linux system.
  2. Work with logs (Syslog, Journald) and configure log rotation.
  3. Use Cron to schedule tasks.
  4. Automate system administration tasks using Ansible.
Hands-On Activities:
  1. Secure a Linux server by disabling root login and enabling SSH key authentication.
  2. Automate log rotation using Cron.
  3. Use Ansible to deploy a web server
Tools You’ll Use:
  1. Free & Open Source: Cockpit, Webmin, Ansible.
  2. Proprietary: Red Hat Satellite, Puppet Enterprise.

Week 5: Windows Server Basics

What You’ll Learn:
  1. Explore Windows file systems (NTFS, ReFS).
  2. Analyze logs using Event Viewer.
  3. Get an overview of Active Directory and domain controllers.
  4. Write basic PowerShell scripts.
Hands-On Activities:
  1. Install Windows Server in a virtual machine.
  2. Configure Active Directory and create user accounts.
  3.  Analyze logs using Event Viewer.
Tools You’ll Use:
  1. Proprietary: Microsoft Windows Server, Active Directory.

Phase 2: Core Defensive Security

Week 6-7: Windows System Administration

What You’ll Learn:
  1. Configure Group Policy Objects (GPOs) in Active Directory.
  2. Understand LDAP and Kerberos authentication.
  3. Write advanced PowerShell scripts for automation.
  4. Integrate Azure AD with on-premise Active Directory.
Hands-On Activities:
  1. Configure GPOs to enforce password policies.
  2. Write PowerShell scripts to manage users and roles.
  3. Integrate on-premise AD with Azure AD.
Tools You’ll Use:
  1. Free & Open Source: PowerShell Core.
  2. Proprietary: Azure Active Directory, Microsoft Endpoint Manager

Week 8: Security Fundamentals

What You’ll Learn:
  1. Understand the CIA Triad (Confidentiality, Integrity, Availability).
  2. Explore common threats like phishing, malware, and DDoS.
  3. Learn about SOC functions and security tools (SIEM, EDR).
Hands-On Activities:
  1. Simulate a phishing attack and analyze its impact.
  2. Use OpenVAS to scan for vulnerabilities.
Tools You’ll Use:
  1. Free & Open Source: OpenVAS, Metasploit Community Edition.
  2. Proprietary: Qualys, Nessus Pro.

Week 9: IDS/IPS Basics

What You’ll Learn:
  1. Understand Intrusion Detection and Prevention Systems (IDS/IPS).
  2. Configure Snort or Suricata for intrusion detection.
Hands-On Activities:
  1. Install and configure Snort for intrusion detection.
  2. Analyze alerts generated by Snort.
Tools You’ll Use:
  1. Free & Open Source: Snort, Suricata.
  2. Proprietary: Palo Alto Threat Prevention, Cisco Firepower.

Week 10: Threat Detection & SIEM Basics

What You’ll Learn:
  1. Understand SIEM (Security Information and Event Management).
  2. Write correlation rules to detect threats.
Hands-On Activities:
  1. Set up Wazuh or ELK Stack.
  2. Write correlation rules to detect suspicious activity.
Tools You’ll Use:
  1. Free & Open Source: Wazuh, Graylog, ELK Stack.
  2. Proprietary: Splunk, QRadar

Phase 3: Advanced Security Operations

Week 14-15: Threat Intelligence

What You’ll Learn:
  1. Gather Open Source Intelligence (OSINT).
  2. Use MISP and Shodan for threat intelligence
Hands-On Activities:
  1. Use Shodan to identify exposed devices.
  2. Analyze threat feeds in MISP
Tools You’ll Use:
  1. o Free & Open Source: MISP, Shodan.
  2. Proprietary: Recorded Future, ThreatConnect.

Phase 4: Capstone Projects & Placement Preparation

Week 21-22: Capstone Projects

What You’ll Learn:
  1. Build a SOC environment from scratch.
  2. Simulate Advanced Persistent Threat (APT) attacks and respond.
Hands-On Activities:
  1. Use VirtualBox and Docker to create a SOC lab.
  2. Simulate an APT attack and analyze logs using SIEM.
Tools You’ll Use:
  1. Free & Open Source: VirtualBox, Vagrant, Docker, Kubernetes.
  2. Proprietary: VMware Workstation Pro.

Week 23: Mock SOC Operations

What You’ll Learn:
  1. Simulate real-world SOC analyst operations.
  2. Detect and respond to incidents.
Hands-On Activities:
  1. Use TheHive to manage incidents.
  2. Analyze logs and respond to simulated threats
Tools You’ll Use:
  1. Free & Open Source: VirtualBox, TheHive.
  2. Proprietary: Splunk, QRadar.

Week 24: Placement Preparation

What You’ll Learn:
  1. Build a cybersecurity-focused resume.
  2. Prepare for SOC-specific interview questions.
Hands-On Activities:
  1. Participate in mock interviews.
  2. Prepare and refine your resume.

Course Highlights

Cyber GRC Hive

Training Duration

4 months 120 Hour+

Class Attendance Required

90%

Cyber GRC Hive

Weekly

2-3 days

Who Can do this

Everyone

Training Mode: Online

Cyber GRC Hive

LIVE Class Duration

2 Hours (Including Live labs/projects)

Trainer

Industry Expert

Lectures

Theoretical concepts explained with real-world examples.

Hands-on Labs

Practical sessions using industry-standard tools.

Case Studies

Analysis of real-world cybersecurity incidents.

Projects

Simulated SOC operations to apply knowledge in a controlled environment.

Tools Covered

Networking

Wireshark, tcpdump ,OpenVPN

Linux

Ubuntu, Fedora, Bash, Ansible

Windows

Windows Server, PowerShell

IDS/IPS

Snort, Suricata.

SIEM

Wazuh, Graylog, Splunk.

Cloud Security

AWS CloudTrail, GuardDuty, Azure Defender.

Threat Detection

Yara, Sigma CLI.

SOAR

Cortex, XSOAR

Evaluation Criteria

Attendance and Participation

10% 10%
Weekly Quizzes
20%
Hands-on Lab Assignments
30%
Capstone Project
30%
Final Interview/Presentation
10%

Mastering SOC: Security Operation Center

📲 +88 01788999886 Course Fee: 29,999 Taka

💳 Payment Options: One-time Payment bKash / Bank / Card

🌍 Live Online Batch – Secure Your Spot Now!

Grow your career with SOC

Please enable JavaScript in your browser to complete this form.
For

For payment info please contact with us. Contact | WhatsApp
bKash, Nagad and  Bank Transfer Available

Scroll to Top