<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="21477" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/ec-csa" lastchanged="2025-10-06T10:09:31+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>EC-Council Certified SOC Analyst</title><productcode>CSA</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-CSA</fullproductcode><version>1</version><objective>&lt;ul&gt;
&lt;li&gt;Gain Knowledge of SOC processes, procedures, technologies, and workflows.&lt;/li&gt;&lt;li&gt;Gain basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker&amp;rsquo;s behaviors, cyber kill chain, etc.&lt;/li&gt;&lt;li&gt;Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.&lt;/li&gt;&lt;li&gt;Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers and workstations).&lt;/li&gt;&lt;li&gt;Gain knowledge of Centralized Log Management (CLM) process.&lt;/li&gt;&lt;li&gt;Able to perform Security events and log collection, monitoring, and analysis.&lt;/li&gt;&lt;li&gt;Gain experience and extensive knowledge of Security Information and Event Management.&lt;/li&gt;&lt;li&gt;Gain knowledge on administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).&lt;/li&gt;&lt;li&gt;Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).&lt;/li&gt;&lt;li&gt;Gain hands-on experience on SIEM use case development process.&lt;/li&gt;&lt;li&gt;Able to develop threat cases (correlation rules), create reports, etc.&lt;/li&gt;&lt;li&gt;Learn use cases that are widely used across the SIEM deployment&lt;/li&gt;&lt;li&gt;Plan, organize, and perform threat monitoring and analysis in the enterprise.&lt;/li&gt;&lt;li&gt;Able to monitor emerging threat patterns and perform security threat analysis.&lt;/li&gt;&lt;li&gt;Gain hands-on experience in alert triaging process.&lt;/li&gt;&lt;li&gt;Able to escalate incidents to appropriate teams for additional assistance&lt;/li&gt;&lt;li&gt;Able to use a Service Desk ticketing system.&lt;/li&gt;&lt;li&gt;Able to prepare briefings and reports of analysis methodology and results.&lt;/li&gt;&lt;li&gt;Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response&lt;/li&gt;&lt;li&gt;Able to make use of varied, disparate, constantly changing threat information.&lt;/li&gt;&lt;li&gt;Gain knowledge of Incident Response Process&lt;/li&gt;&lt;li&gt;Gain understating of SOC and IRT collaboration for better incident response.&lt;/li&gt;&lt;/ul&gt;</objective><audience>&lt;ul&gt;
&lt;li&gt;SOC Analysts (Tier I and Tier II)&lt;/li&gt;&lt;li&gt;Network and Security Administrators, Network and Security Engineers, Network Defense Analyst,Network Defense Technicians, Network Security Specialist, Network Security Operator, and any security professional handling network security operations&lt;/li&gt;&lt;li&gt;Cybersecurity Analyst&lt;/li&gt;&lt;li&gt;Entry-level cybersecurity professionals&lt;/li&gt;&lt;li&gt;Anyone who wants to become a SOC Analyst.&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;Module 1: Security Operations and Management&lt;/li&gt;&lt;li&gt;Module 2: Understanding Cyber Threats, IoCs, and Attack Methodology&lt;/li&gt;&lt;li&gt;Module 3: Incidents, Events, and Logging&lt;/li&gt;&lt;li&gt;Module 4: Incident Detection with Security Information and Event Management (SIEM)&lt;/li&gt;&lt;li&gt;Module 5: Enhanced Incident Detection with Threat Intelligence&lt;/li&gt;&lt;li&gt;Module 6: Incident Response&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Gain Knowledge of SOC processes, procedures, technologies, and workflows.
- Gain basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, etc.
- Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
- Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers and workstations).
- Gain knowledge of Centralized Log Management (CLM) process.
- Able to perform Security events and log collection, monitoring, and analysis.
- Gain experience and extensive knowledge of Security Information and Event Management.
- Gain knowledge on administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
- Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
- Gain hands-on experience on SIEM use case development process.
- Able to develop threat cases (correlation rules), create reports, etc.
- Learn use cases that are widely used across the SIEM deployment
- Plan, organize, and perform threat monitoring and analysis in the enterprise.
- Able to monitor emerging threat patterns and perform security threat analysis.
- Gain hands-on experience in alert triaging process.
- Able to escalate incidents to appropriate teams for additional assistance
- Able to use a Service Desk ticketing system.
- Able to prepare briefings and reports of analysis methodology and results.
- Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response
- Able to make use of varied, disparate, constantly changing threat information.
- Gain knowledge of Incident Response Process
- Gain understating of SOC and IRT collaboration for better incident response.</objective_plain><audience_plain>- SOC Analysts (Tier I and Tier II)
- Network and Security Administrators, Network and Security Engineers, Network Defense Analyst,Network Defense Technicians, Network Security Specialist, Network Security Operator, and any security professional handling network security operations
- Cybersecurity Analyst
- Entry-level cybersecurity professionals
- Anyone who wants to become a SOC Analyst.</audience_plain><outline_plain>- Module 1: Security Operations and Management
- Module 2: Understanding Cyber Threats, IoCs, and Attack Methodology
- Module 3: Incidents, Events, and Logging
- Module 4: Incident Detection with Security Information and Event Management (SIEM)
- Module 5: Enhanced Incident Detection with Threat Intelligence
- Module 6: Incident Response</outline_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="SI" currency="EUR">1950.00</price><price country="GR" currency="EUR">1950.00</price><price country="MK" currency="EUR">1950.00</price><price country="HU" currency="EUR">1950.00</price><price country="DE" currency="EUR">3500.00</price><price country="AT" currency="EUR">3500.00</price><price country="SE" currency="EUR">3500.00</price><price country="NL" currency="EUR">3950.00</price><price country="CH" currency="CHF">3500.00</price></pricelist><miles/></course>