Security Operations (SOC) 101 Course – Over 10 Hours of Content

Join the Flare Academy Community at https://www.tcm.rocks/flare-academy-discord. The next free live training with Tammy is scheduled for April 16th.

The Cyber Mentor195.1K views11:51:18

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in South Korea under the topic 'cybersecurity news today'.

About this video

https://www.tcm.rocks/flare-academy-discord Join the Flare Academy Community! Their next upcoming FREE live training is happening on April 16th, where Tammy Harper (Senior Threat Intelligence Researcher) will lead a deep dive into the world of cybercrime, and how security professionals can infiltrate it. :scream: Discover the long-term OPSEC techniques, the secrets of convincing SOC puppets and more! Check out the full SOC 101 course here: https://tcm.rocks/soc101-y Join the SOC Level 1 Training happening this July! Andrew Prince will be your teacher for this 4-day course that will prep you to pass the PSAA and to land a Tier 1-2 SOC role. https://tcm.rocks/soclive-y Want to check out the cert SOC 101 prepares you for, the Practical SOC Analyst Associate (PSAA?) Learn more about it here: https://www.tcm.rocks/psaa-y Course Repository: https://github.com/MalwareCube/SOC101_Free Course References Booklet: https://github.com/MalwareCube/SOC101_Free/blob/main/resources/Reference_Booklet.md Sponsor a Video: https://www.tcm.rocks/Sponsors Pentests & Security Consulting: https://tcm-sec.com Get Trained: https://academy.tcm-sec.com Get Certified: https://certifications.tcm-sec.com Merch: https://merch.tcm-sec.com Introduction 00:00 - Introduction 00:01:47- Flare Intro ad 07:00 - Course Objectives 10:23 - Prerequisites and Course Resources Lab Setup 16:05 - Installing Oracle VM VirtualBox 20:57 - Installing Windows 33:06 - Configuring Windows 43:22 - Installing Ubuntu 55:58 - Configuring Ubuntu 1:01:44 - Configuring the Lab Network Security Operations Fundamentals 1:07:06 - The SOC and Its Role 1:25:46 - Information Security Refresher 1:48:40 - SOC Models, Roles, and Organizational Structures 2:00:09 - Incident and Event Management 2:07:35 - SOC Metrics 2:13:34 - SOC Tools 2:29:48 - Common Threats and Attacks Phishing Analysis 2:46:47 - Introduction to Phishing 3:00:51 - Email Fundamentals 3:13:25 - Phishing Analysis Configuration 3:19:30 - Phishing Attack Types 3:35:47 - Phishing Attack Techniques 3:50:47 - Email Analysis Methodology 3:56:27 - Email Header and Sender Analysis 4:17:51 - Email Authentication Methods 4:35:18 - Email Content Analysis 4:48:07 - The Anatomy of a URL 4:57:36 - Email URL Analysis 5:18:27 - Email Attachment Analysis 5:33:06 - Dynamic Attachment Analysis and Sandboxing 5:54:25 - Flare Middle ad 5:56:06 - Static MalDoc Analysis 6:03:00 - Static PDF Analysis 6:13:47 - Automated Email Analysis with PhishTool 6:19:58 - Reactive Phishing Defense 6:47:24 - Proactive Phishing Defense 7:00:43 - Documentation and Reporting 7:12:35 - Additional Phishing Practice Network Security 7:16:29 - Introduction to Network Security 7:22:07 - Network Security Theory 7:52:04 - Packet Capture and Flow Analysis 8:03:54 - Introduction to tcpdump 8:19:28 - tcpdump: Capturing Network Traffic 8:33:44 - tcpdump: Analyzing Network Traffic 8:47:32 - tcpdump: Analyzing Network Traffic (Sample 2) 9:02:17 - Introduction to Wireshark 9:18:09 - Wireshark: Capture and Display Filters 9:30:08 - Wireshark: Statistics 9:42:05 - Wireshark: Analyzing Network Traffic 10:01:34 - Intrusion Detection and Prevention Systems 10:09:15 - Introduction to Snort 10:26:52 - Snort: Reading and Writing Rules 10:51:36 - Snort: Intrusion Detection and Prevention 11:12:30 - Additional Network Traffic Analysis Practice Endpoint Security 11:15:43 - Introduction to Endpoint Security 11:20:25 - Endpoint Security Controls 11:33:40 - Creating Our Malware 11:47:27 - Flare Outro Ad Conclusion 11:49:04 This is only the tip of the iceberg! Check out https://tcm.rocks/soc101-y for the full course, where we deep dive into: Security Operations Fundamentals Phishing Analysis Network Security Monitoring Network Traffic Analysis Endpoint Security Monitoring =Threat Intelligence Digital Forensics Incident Response 📱Social Media📱 ___________________________________________ X: https://x.com/TCMSecurity Twitch: https://www.twitch.tv/thecybermentor Instagram: https://www.instagram.com/tcmsecurity/ LinkedIn: https://www.linkedin.com/company/tcm-security-inc/ TikTok: https://www.tiktok.com/@tcmsecurity Discord: https://discord.gg/tcm Facebook: https://www.facebook.com/tcmsecure 💸Donate💸 ___________________________________________ Like the channel? Please consider supporting me on Patreon: https://www.patreon.com/thecybermentor Support the stream (one-time): https://streamlabs.com/thecybermentor *We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.

Video Information

Views
195.1K

Total views since publication

Likes
5.8K

User likes and reactions

Duration
11:51:18

Video length

Published
Mar 31, 2025

Release date

Quality
hd

Video definition