Security Operations (SOC) 101 Course – Over 10 Hours of Content
Join the Flare Academy Community at https://www.tcm.rocks/flare-academy-discord. The next free live training with Tammy is scheduled for April 16th.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
https://www.tcm.rocks/flare-academy-discord Join the Flare Academy Community! Their next upcoming FREE live training is happening on April 16th, where Tammy Harper (Senior Threat Intelligence Researcher) will lead a deep dive into the world of cybercrime, and how security professionals can infiltrate it. :scream: Discover the long-term OPSEC techniques, the secrets of convincing SOC puppets and more!
Check out the full SOC 101 course here: https://tcm.rocks/soc101-y
Join the SOC Level 1 Training happening this July! Andrew Prince will be your teacher for this 4-day course that will prep you to pass the PSAA and to land a Tier 1-2 SOC role. https://tcm.rocks/soclive-y
Want to check out the cert SOC 101 prepares you for, the Practical SOC Analyst Associate (PSAA?) Learn more about it here: https://www.tcm.rocks/psaa-y
Course Repository: https://github.com/MalwareCube/SOC101_Free
Course References Booklet: https://github.com/MalwareCube/SOC101_Free/blob/main/resources/Reference_Booklet.md
Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests & Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com
Introduction
00:00 - Introduction
00:01:47- Flare Intro ad
07:00 - Course Objectives
10:23 - Prerequisites and Course Resources
Lab Setup
16:05 - Installing Oracle VM VirtualBox
20:57 - Installing Windows
33:06 - Configuring Windows
43:22 - Installing Ubuntu
55:58 - Configuring Ubuntu
1:01:44 - Configuring the Lab Network
Security Operations Fundamentals
1:07:06 - The SOC and Its Role
1:25:46 - Information Security Refresher
1:48:40 - SOC Models, Roles, and Organizational Structures
2:00:09 - Incident and Event Management
2:07:35 - SOC Metrics
2:13:34 - SOC Tools
2:29:48 - Common Threats and Attacks
Phishing Analysis
2:46:47 - Introduction to Phishing
3:00:51 - Email Fundamentals
3:13:25 - Phishing Analysis Configuration
3:19:30 - Phishing Attack Types
3:35:47 - Phishing Attack Techniques
3:50:47 - Email Analysis Methodology
3:56:27 - Email Header and Sender Analysis
4:17:51 - Email Authentication Methods
4:35:18 - Email Content Analysis
4:48:07 - The Anatomy of a URL
4:57:36 - Email URL Analysis
5:18:27 - Email Attachment Analysis
5:33:06 - Dynamic Attachment Analysis and Sandboxing
5:54:25 - Flare Middle ad
5:56:06 - Static MalDoc Analysis
6:03:00 - Static PDF Analysis
6:13:47 - Automated Email Analysis with PhishTool
6:19:58 - Reactive Phishing Defense
6:47:24 - Proactive Phishing Defense
7:00:43 - Documentation and Reporting
7:12:35 - Additional Phishing Practice
Network Security
7:16:29 - Introduction to Network Security
7:22:07 - Network Security Theory
7:52:04 - Packet Capture and Flow Analysis
8:03:54 - Introduction to tcpdump
8:19:28 - tcpdump: Capturing Network Traffic
8:33:44 - tcpdump: Analyzing Network Traffic
8:47:32 - tcpdump: Analyzing Network Traffic (Sample 2)
9:02:17 - Introduction to Wireshark
9:18:09 - Wireshark: Capture and Display Filters
9:30:08 - Wireshark: Statistics
9:42:05 - Wireshark: Analyzing Network Traffic
10:01:34 - Intrusion Detection and Prevention Systems
10:09:15 - Introduction to Snort
10:26:52 - Snort: Reading and Writing Rules
10:51:36 - Snort: Intrusion Detection and Prevention
11:12:30 - Additional Network Traffic Analysis Practice
Endpoint Security
11:15:43 - Introduction to Endpoint Security
11:20:25 - Endpoint Security Controls
11:33:40 - Creating Our Malware
11:47:27 - Flare Outro Ad
Conclusion
11:49:04
This is only the tip of the iceberg! Check out https://tcm.rocks/soc101-y for the full course, where we deep dive into:
Security Operations Fundamentals
Phishing Analysis
Network Security Monitoring
Network Traffic Analysis
Endpoint Security Monitoring
=Threat Intelligence
Digital Forensics
Incident Response
📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
https://www.patreon.com/thecybermentor
Support the stream (one-time): https://streamlabs.com/thecybermentor
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
Video Information
Views
195.1K
Total views since publication
Likes
5.8K
User likes and reactions
Duration
11:51:18
Video length
Published
Mar 31, 2025
Release date
Quality
hd
Video definition