<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

All actions that take place within the SOC are largely under the control of a Security Operation Centre Analyst. Security operations analysts collaborate with security engineers and SOC managers to identify, contain, and eliminate IT threats in order to provide situational awareness. Cybercriminals are adopting a variety of breaching techniques to harm the computer system due to the increase in cyber threats and intrusions. They need an Analyst who is in charge of managing its security activities as a result. SOC is for Security operation Centre, and it refers to the division and group of cyber security experts who keep an eye on the company's network and data for cyberattacks and other occurrences in real time.

An in-depth programme called SOC Analyst Fundamental (Pro/Advance) is the prerequisite for working at a security operations centre (SOC). It is designed to help present and future Tier I and Tier II SOC analysts become proficient in carrying out operations at the entry-level and intermediate level. Such a training and certification programme aids the candidate in gaining cutting-edge technical abilities that are in high demand by providing instruction from some of the most knowledgeable teachers in the field. Through thorough, meticulous knowledge and advanced level capabilities for dynamically contributing to a SOC team, the programme focuses on opening up new job prospects. Before imparting the knowledge of log management and correlation, SIEM implementation, advanced incident detection, and incident response, it discusses the foundations of SOC operations in great detail.

Course Rating

View All Reviews »

Students Enrolled and Counting…

Full List of Alumni »

Why to Choose this Course?

A SOC team offers
high-quality IT security services
to detect potential cyber threats/attacks actively and quickly respond to security incidents.

Course Syllabus »

To handle sophisticated threats,
enterprises need ADVANCED cyber security solutions
along with traditional methods of defense.

A SOC Analyst continuously
monitors and detects potential threats,
triages the alerts, and appropriately escalates them.

Organizations need
skilled SOC Analysts who can serve as the FRONT-LINE defenders,
warning other professionals of emerging and present cyber threats.

Jobs »


24 hours - 2 classes per week



Graduate and one year of work experience in the Network Admin/Security.

Course Fees

Course Fees

Class Room Training

Inclusive of all taxes

Online Training

Inclusive of all taxes

What You Will Get?

24 Hours
in-depth training by best faculties from cyber security industry

Study Materials
and examination voucher

SOC Analyst Fundamental Certificate
of completion after examination and alumni status

Course Benefits:

Learning Objectives of SA

  • Gain Knowledge of SOC processes, procedures, technologies, and workflows.
  • Gain basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviours, cyber kill chain, etc.
  • Able to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs) that can be utilized during active and future investigations.
  • Able to monitor and analyze logs and alerts from a variety of different technologies across multiple platforms (IDS/IPS, end-point protection, servers and workstations).
  • Gain knowledge of Centralized Log Management (CLM) process.
  • Able to perform Security events and log collection, monitoring, and analysis.
  • Gain experience and extensive knowledge of Security Information and Event Management.
  • Gain knowledge on administering SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
  • Understand the architecture, implementation and fine tuning of SIEM solutions (Splunk/AlienVault/OSSIM/ELK).
  • Gain hands-on experience on SIEM use case development process.
  • Able to develop threat cases (correlation rules), create reports, etc.
  • Learn use cases that are widely used across the SIEM deployment.
  • Plan, organize, and perform threat monitoring and analysis in the enterprise.
  • Able to monitor emerging threat patterns and perform security threat analysis.
  • Gain hands-on experience in alert triaging process.
  • Able to escalate incidents to appropriate teams for additional assistance.
  • Able to use a Service Desk ticketing system.
  • Able to prepare briefings and reports of analysis methodology and results.
  • Gain knowledge of integrating threat intelligence into SIEM for enhanced incident detection and response.
  • Able to make use of varied, disparate, constantly changing threat information.
  • Gain knowledge of Incident Response Process.
  • Gain understating of SOC and IRT collaboration for better incident response.

Your Course Path

SOC Course Path

Course Details

  1. The lab-intensive SOC Analyst Fundamental training program emphasizes the holistic approach to deliver elementary as well as advanced knowledge of how to identify and validate intrusion attempts.
  2. Through this, the candidate will learn to use SIEM solutions and predictive capabilities using threat intelligence.
  3. The program also introduces the practical aspect of SIEM using advanced and the most frequently used tools.
  4. The candidate will learn to perform enhanced threat detection using the predictive capabilities of Threat Intelligence.
Introduction to Security Operations Center (SOC)2 Hours
  • Overview of SOC functions and responsibilities (Day 1)
  • Understanding the SOC analyst role (Day 1)
  • Introduction to the incident response lifecycle (Day 1)
  • Overview of common cyber threats and attack vectors (Day 2)
  • Understanding threat actors and their motivations (Day 2)
  • Current trends in cyber attacks (Day 2)
  • Introduction to security event monitoring and log analysis (Day 3 & 4)
  • Common security event sources (logs, network traffic, system alerts) (Day 3 & 4)
  • Log analysis techniques and tools (Day 3 & 4)
  • Techniques for detecting security incidents (Day 5)
  • Incident classification and severity levels (Day 5)
  • Establishing incident response priorities (Day 5)
  • Incident response planning and frameworks (e.g., NIST, ISO 27035) (Day 6)
  • Incident response roles and responsibilities (Day 6)
  • Incident containment and eradication strategies (Day 6)
  • Introduction to threat intelligence (Day 7)
  • Threat hunting methodologies and tools (Day 7)
  • Leveraging threat intelligence in SOC operations (Day 7)
  • Overview of vulnerability management processes (Day 8)
  • Prioritizing and remediating vulnerabilities (Day 8)
  • Patch management best practices (Day 8)
  • Techniques for investigating security incidents (Day 9)
  • Digital forensics fundamentals (Day 9)
  • Preserving and analyzing digital evidence (Day 9)
  • Creating incident reports and documenting findings (Day 10)
  • Communication strategies for different stakeholders (Day 10)
  • Presenting incident analysis and recommendations (Day 10)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensic - How promising is the future? A thorough career guide
Building a career in Digital Forensic - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Get In Touch

Related Course

Enroll Now »

Enroll Now

Fields marked with * are mandatory.

Know Your Faculty
Sandeep Sengupta
Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Kirit Sankar Gupta
Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensic and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Saumitra Biswas
Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Amrita Acharya
Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.

Syed Soel Hossain
Syed Soel Hossain
BTech(ECE), CHFI, CSA, EH, Bug Bounty

He is an information security analyst at ISOAH whose expertise lies in CHFI, CSA, EH, Linux & Bug Bounty. He has received several Hall of fame and acknowledgements from the Government of India for finding valid bugs.


Ratings & Reviews

SOC Analyst Fundamental

Course Rating
Based On
100 Students Rating

Gurinder Singh
Date: 25.01.2023
Course: SOC Analyst Fundamental

According to me ISOEH(INDIAN SCHOOL OF ETHICAL HACKING) Is the best ethical hacking school I have ever seen. People who are interested in such type of field can join this institution… without any hesitation.

Kunal Maity
Date: 26.02.2023
Course: SOC Analyst Fundamental

I have completed their Summer ethical hacking course and it was very helpful for me I learnt many things which earlier was not known for me. Teacher was very good helped me each and every time whenever I got stuck on my problems. I also enrolled there CCNA course because I want to pursue my career on Networking for that review I will update bit soon when I will compete it but for now it's going very good.

Aman Shukla
Date: 02.04.2023
Course: SOC Analyst Fundamental

ISOEH is providing you experienced faculties, All Teachers are certified Ethical Hackers & Associated with the IT security industry over many years. The hacking lab consists of multiple VMs of different operating system, Which students have to hack when practicing. It will be the best institute for building your skills and carrier in cyber security and hacking.

Rishav Sharma
Date: 17.06.2023
Course: SOC Analyst Fundamental

The way they taught you is based on industrial requirements and you need to utilize your knowledge and experience in this field do your own practice.


Job Prospects & Job Sources

The Profiles that count for SOC Analyst Fundamental Individuals include the following:

SOC Analyst Information Security Analyst IT Security Analyst Cyber Threat Analyst

The average salary of SOC analyst in India is Rs 4 lakhs per annually.


What is the course content?
  • Introduction to Security Operations Center (SOC)
  • Cyber Threat Landscape
  • Security Event Monitoring and Analysis
  • Security Incident Detection and Classification
  • Security Incident Response Procedures
  • Threat Intelligence and Threat Hunting
  • Vulnerability Management and Patching
  • Security Incident Investigation
  • Security Incident Reporting and Communication
What is the course Duration?

24 hours

Who is it for?
  • SOC Analyst Fundamental (Tier I and Tier II)
  • Network and Security Administrators, Network and Security Engineers, Network Defense Analyst, Network Defense Technicians, Network Security Specialist, Network Security Operator, and any security professional handling network security operations
  • Cybersecurity Analyst
  • Entry-level cybersecurity professionals
  • Anyone who wants to become a SOC Analyst
What is the course Prerequisites?

Complete 12th board exam and basic networking knowledge or CCNA.

What is the career path after doing this course?

This Pro/Advance program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team.

What is the next step after SOC Analyst Fundamental?

You can upgrade your career by doing a Global Certification Course (CSA- Certified SOC Analyst) from EC-Council and then apply to join a security operations center (SOC).

Online Interactive Classroom with dedicated Faculty

Course Fees

Inclusive of all taxes

Weekend Batches for Kolkata Center:
Reg. Date
Start Date
End Date
Jun, 2024
Jun, 2024
Aug, 2024
Pay Now
Internal Assessment (Practical) : Catch the flag(CTF)

Member of:

Data Security Council of India