green padlock on pink surface

Cyber Security Training Curriculum

Module 1: Foundations of Cybersecurity & SOC Operations
  • Cybersecurity Basics

  • SOC Structure

  • Common SOC Tools

  • Incident Response Lifecycle

  • Security Frameworks & Models

  • SOC Metrics

Module 2: SIEM – Microsoft Sentinel
  • Introduction to Microsoft Sentinel

  • Data Collection & Connectors

  • Log Analytics & KQL

  • Analytics Rules

  • Workbooks & Dashboards

  • Incident Investigation

Module 3: EDR - Microsoft Defender for Endpoint
  • Introduction & Architecture

  • Device Onboarding

  • Alerts and Incidents

  • Device Investigation

  • Response Actions

  • Advanced Features

  • Advanced Features

Module 4: Email Security - Microsoft Defender for Office 365
  • Email Threat Landscape

  • Defender for O365 Overview

  • Policy Configuration

  • Threat Explorer

  • Attack Simulation Training

Module 5: Identity Protection and Management
  • Identity Basics

  • Identity Protection Features

  • Conditional Access & MFA

  • Privileged Identity Management

  • Monitoring & Logs

  • Monitoring & Logs

Module 6: Vulnerability Management - Nessus
  • VM Basics

  • Nessus Overview

  • Scan Configuration

  • Report Analysis

  • Integration & Mapping

Module 7: Threat Intelligence & Threat Hunting
  • Threat Intelligence Basics

  • Sources and Platforms

  • Hunting in Sentinel

  • Dashboard and Documentation

  • Hypothesis Formation

  • Query Development

  • Investigation

  • Documentation

Module 8: Capstone Project
  • Analyze a simulated incident

  • Use Microsoft Sentinel for detection

  • Investigate via Defender for Endpoint and Defender for O365

  • Correlate identity logs from Entra ID

  • Reference vulnerability data from Nessus

  • Perform threat hunting and document findings

Career Opportunities After Completing This SOC Course

SOC Analyst (Level 1 / Level 2 / Level 3)

Typical Titles:

  • SOC Analyst - L1 / L2 / L3

  • Cybersecurity Analyst

  • Security Analyst (SOC)

  • Security Monitoring Analyst

Key Skills Covered:

  • Alert triage and investigation (Microsoft Sentinel)

  • Endpoint and email threat analysis (Defender suite)

  • KQL queries, playbooks, use cases

Incident Responder

Typical Titles:

  • Incident Response Analyst

  • Cyber Incident Responder

  • Digital Forensics & IR Analyst (DFIR)

Key Skills Covered:

  • End-to-end IR lifecycle

  • Investigation using Defender for Endpoint and Entra ID

  • Threat intel enrichment and reporting

Threat Hunter

Typical Titles:

  • Cyber Threat Hunter

  • Threat Detection Engineer

  • Threat Research Analyst

Key Skills Covered:

  • Hypothesis-based threat hunting

  • Using KQL in Sentinel

  • MITRE ATT&CK mapping

  • TI integration

Security Engineer / SIEM Engineer

Typical Titles:

  • SIEM Engineer (Microsoft Sentinel)

  • Security Content Developer

  • Security Engineer (EDR/SOAR)

Key Skills Covered:

  • Data connector onboarding

  • Analytics rule tuning & dashboarding

  • SOAR playbook creation (Logic Apps)

Email Security Analyst

Typical Titles:

  • Email Security Analyst

  • Messaging Security Analyst

  • Microsoft Defender for O365 Specialist

Key Skills Covered:

  • Phishing detection

  • Safe Link/Safe Attachment policies

  • Email header analysis and campaign investigation

Identity & Access Analyst

Typical Titles:

  • IAM Analyst

  • Azure AD/Entra Security Analyst

  • Identity Protection Specialist

Key Skills Covered:

  • Risk-based sign-in analysis

  • Conditional Access

  • MFA

  • Entra ID integration and monitoring

Vulnerability Management Analyst

Typical Titles:

  • Vulnerability Analyst

  • VM & Patch Management Analyst

  • Nessus Analyst

Key Skills Covered:

  • Vulnerability scanning and interpretation

  • CVSS scoring, prioritization

  • Mapping to SOC incidents and reports

Cybersecurity Consultant / MSSP Analyst

Typical Titles:

  • Cybersecurity Consultant

  • SOC Analyst - MSSP

  • Security Consultant (SIEM/EDR/TI)

Key Skills Covered:

  • End-to-end SOC service knowledge

  • Reporting

  • Client communication

  • Integrating multi-tenant environment

The hands-on training and mentorship transformed my career in cybersecurity. Highly recommend Cyber Security Experts!

Justin

A computer monitor displays a webpage from HelpDesk Heroes, featuring a contact address and email. Social media icons including Facebook, LinkedIn, Twitter, Instagram, and Pinterest are visible. The screen also shows a Trustpilot rating. A stack of cookies is partially visible at the bottom of the image, and part of a keyboard can be seen in the foreground.
A computer monitor displays a webpage from HelpDesk Heroes, featuring a contact address and email. Social media icons including Facebook, LinkedIn, Twitter, Instagram, and Pinterest are visible. The screen also shows a Trustpilot rating. A stack of cookies is partially visible at the bottom of the image, and part of a keyboard can be seen in the foreground.

★★★★★