
Cyber Security Training Curriculum

Module 1: Foundations of Cybersecurity & SOC Operations
Cybersecurity Basics
SOC Structure
Common SOC Tools
Incident Response Lifecycle
Security Frameworks & Models
SOC Metrics
Module 2: SIEM – Microsoft Sentinel
Introduction to Microsoft Sentinel
Data Collection & Connectors
Log Analytics & KQL
Analytics Rules
Workbooks & Dashboards
Incident Investigation
Module 3: EDR - Microsoft Defender for Endpoint
Introduction & Architecture
Device Onboarding
Alerts and Incidents
Device Investigation
Response Actions
Advanced Features
Advanced Features
Module 4: Email Security - Microsoft Defender for Office 365
Email Threat Landscape
Defender for O365 Overview
Policy Configuration
Threat Explorer
Attack Simulation Training
Module 5: Identity Protection and Management
Identity Basics
Identity Protection Features
Conditional Access & MFA
Privileged Identity Management
Monitoring & Logs
Monitoring & Logs
Module 6: Vulnerability Management - Nessus
VM Basics
Nessus Overview
Scan Configuration
Report Analysis
Integration & Mapping
Module 7: Threat Intelligence & Threat Hunting
Threat Intelligence Basics
Sources and Platforms
Hunting in Sentinel
Dashboard and Documentation
Hypothesis Formation
Query Development
Investigation
Documentation
Module 8: Capstone Project
Analyze a simulated incident
Use Microsoft Sentinel for detection
Investigate via Defender for Endpoint and Defender for O365
Correlate identity logs from Entra ID
Reference vulnerability data from Nessus
Perform threat hunting and document findings

Career Opportunities After Completing This SOC Course
SOC Analyst (Level 1 / Level 2 / Level 3)
Typical Titles:
SOC Analyst - L1 / L2 / L3
Cybersecurity Analyst
Security Analyst (SOC)
Security Monitoring Analyst
Key Skills Covered:
Alert triage and investigation (Microsoft Sentinel)
Endpoint and email threat analysis (Defender suite)
KQL queries, playbooks, use cases
Incident Responder
Typical Titles:
Incident Response Analyst
Cyber Incident Responder
Digital Forensics & IR Analyst (DFIR)
Key Skills Covered:
End-to-end IR lifecycle
Investigation using Defender for Endpoint and Entra ID
Threat intel enrichment and reporting
Threat Hunter
Typical Titles:
Cyber Threat Hunter
Threat Detection Engineer
Threat Research Analyst
Key Skills Covered:
Hypothesis-based threat hunting
Using KQL in Sentinel
MITRE ATT&CK mapping
TI integration
Security Engineer / SIEM Engineer
Typical Titles:
SIEM Engineer (Microsoft Sentinel)
Security Content Developer
Security Engineer (EDR/SOAR)
Key Skills Covered:
Data connector onboarding
Analytics rule tuning & dashboarding
SOAR playbook creation (Logic Apps)
Email Security Analyst
Typical Titles:
Email Security Analyst
Messaging Security Analyst
Microsoft Defender for O365 Specialist
Key Skills Covered:
Phishing detection
Safe Link/Safe Attachment policies
Email header analysis and campaign investigation
Identity & Access Analyst
Typical Titles:
IAM Analyst
Azure AD/Entra Security Analyst
Identity Protection Specialist
Key Skills Covered:
Risk-based sign-in analysis
Conditional Access
MFA
Entra ID integration and monitoring
Vulnerability Management Analyst
Typical Titles:
Vulnerability Analyst
VM & Patch Management Analyst
Nessus Analyst
Key Skills Covered:
Vulnerability scanning and interpretation
CVSS scoring, prioritization
Mapping to SOC incidents and reports
Cybersecurity Consultant / MSSP Analyst
Typical Titles:
Cybersecurity Consultant
SOC Analyst - MSSP
Security Consultant (SIEM/EDR/TI)
Key Skills Covered:
End-to-end SOC service knowledge
Reporting
Client communication
Integrating multi-tenant environment
The hands-on training and mentorship transformed my career in cybersecurity. Highly recommend Cyber Security Experts!
Justin


★★★★★
Training
Empowering the next generation of cyber defenders.
Support
Careers
+917893512634
© 2025. All rights reserved.