I studied every expensive SOC Analyst training program I could find to make this👇
🕵️The Ultimate FREE Career Path: SOC Analyst Edition
This is easily a $1,000+ SOC Analyst training program for FREE!
This learning path uses completely free learning resources to teach you everything you need to know to break into a SOC (Security Operations Center) role.
I truly believe that if you apply yourself to this curriculum, you will land a job as a SOC Analyst.
This was a lot of work, so please do me a favor and repost this so we can get this free guide to as many people as possible!
Make sure to read #8!
Let’s begin👇
- The Foundations of Cybersecurity🔐
These are non-negotiable concepts you MUST know:
1.1 Basics of Computing
Understand computer hardware, software, and troubleshooting,
👉https://coursera.org/learn/technical-support-fundamentals?specialization=google-it-support
1.2 Networking
Get hands on experience while learning networking,
👉https://skillsforall.com/career-path/network-technician
1.3 Linux
Many security tools and IT infrastructures use Linux. It is a critical skill in cyber security,
👉https://tryhackme.com/module/linux-fundamentals
1.4 Windows
Learn the most used corporate Operating System in the world and how to defend it,
👉https://tryhackme.com/module/windows-fundamentals
1.5 PowerShell and Bash Scripting
Scripting is an important skill to develop for IT and Cybersecurity. Don’t skip it!
PowerShell
👉https://youtube.com/watch?v=UVUd9_k9C6A
Bash Scripting
👉https://youtube.com/watch?v=2733cRPudvI&list=PLT98CRl2KxKGj-VKtApD8-zCqSaN2mD4w
1.6 Intro to Cybersecurity
The main concepts of Cybersecurity including tools and frameworks,
👉https://coursera.org/learn/foundations-of-cybersecurity
- Attacker Methodology😈
To defend against attackers, you must first understand them.
2.1 MITRE ATT&CK Framework
Learn how to use the MITRE ATT&CK Framework to defend against the most common tactics and techniques of criminal hackers,
👉https://cybrary.it/course/application-of-the-mitre-attack-framework
2.2 Cybersecurity Kill Chain™
Achieve visibility into adversary’s attack objectives,
👉https://cybrary.it/course/cybersecurity-kill-chain
- Open Source Intelligence (OSINT)🔎
Know how to look for relevant Cybersecurity information,
👉https://youtube.com/watch?v=qwA6MmbeGNo
- Network Traffic Analysis🌐
4.1 Wireshark / TCPdump
Learn how to practically use Wireshark and TCPdump to analyze network traffic,
👉https://securityblue.team/courses/network-analysis-training-beginner
4.2 Zeek
Learn how to effectively use Zeek, an Open Source Network Security Monitoring Tool,
4.3 Snort,
Learn how to effectively us Snort, an Open Source Intrusion Detection System (IDS),
👉https://tryhackme.com/room/snort
- Endpoint Security and Cyber Attacks🔐
5.1 Sysmon
System Monitor (Sysmon) is a Windows system service that is used widely in Cybersecurity
👉https://youtube.com/watch?v=7P_XzFUwQxw
5.2 Osquery
One of the most widely used endpoint visibility frameworks,
👉https://youtube.com/watch?v=8stfJfcAM5Q
5.3 Windows Privilege Escalation
Not technically endpoint security but I think it’s important to understand how privilege escalation works in order to defend against it,
Windows👉https://youtube.com/watch?v=uTcrbNBcoxQ
Linux👉https://youtube.com/watch?v=ZTnwg3qCdVM
5.4 Hacking Active Directory
Active Directory and the common attacks against it are critical to know for any Cybersecurity professional. I am putting this here because you should have most of prerequisite knowledge to make use of this class,
👉https://youtube.com/watch?v=VXxH4n684HE
- SIEM – Security Information and Event Management📊
6.1 Intro to SIEMs
SIEMs are one of the most used tools for SOC Analysts,
👉https://cybrary.it/course/introduction-to-siem-tools
6.2 Wazuh
Wazuh is an Open Source XDR/SIEM tool that is widely used,
👉https://youtube.com/watch?v=i68atPbB8uQ&t
6.3 ELK – Elasticsearch, Logstash, Kibana
ELK is another Open Source SIEM tool that is widely used,
👉https://youtube.com/watch?v=IwlV3wVX4xs&list=PLyJqGMYm0vnMHLPbmT1-fknzTzR7auBEb
6.4 Splunk
Splunk is the gold standard SIEM tool and more,
👉https://udemy.com/course/splunk-basics-course/
- SOC Fundamentals / Incident Response🥷
This is a course that will reinforce all of the learning you have done up to this point. Consider this a review that will also close any gaps you have from the previous classes.
It will cover aspects of incident response and how SOCs work day to day,
👉https://coursera.org/learn/security-operations-center-soc
- Pro Tips, Certifications, and Wrap Up✅
8.1 Project Portfolio
As you are working through these classes, I believe it is CRUCIAL to document your learning and hands on activities in a project portfolio.
Recruiters and hiring managers LOVE project portfolios!
I have a free guide on how to do that here,
👉How to make a FREE portfolio to boost your resume!
8.2 Take Your Time, Try Harder
If you want a career in a SOC, then you need to take your time with these classes.
Do not rush.
Take notes, review those notes, document everything in your portfolio.
If you get stuck on a subject or a technical issue, you MUST get yourself out of it if possible.
Google and ChatGPT are going to be essential.
8.3 Home Lab
Cybersecurity is hands on.
I highly recommend you set up a home lab. Many of the classes above are hands on.
If they are not hands on then I HIGHLY recommend you download anything you need for that class to follow along and make it hands on.
Here is a guide for making a home lab,
👉https://youtube.com/watch?v=kku0fVfksrk
8.4 Certifications*
I do not believe you need any certifications to become a SOC Analyst if you have a strong portfolio and resume. Which you will if you follow this guide as written!
That said, you can probably pass any SOC Analyst cert below with minimal additional studying after doing this guide:
GIAC Security Operations Certified (GSOC)
HTB Certified Defensive Security Analyst (HTB CDSA)
EC-Council Certified SOC Analyst (CSA)
SBT Blue Team Level 1
OffSec Defense Analyst (OSDA)
*These certs are obviously not free. Some of them are really expensive. A good portfolio will silence any doubters.
8.5 Wrap up
This guide was a lot of work and I genuinely hope you found it useful.
If you did, please leave consider sharing it with anyone who may find it useful!
Peace✌️,
WP