Become a SOC Analyst - Level 1
Accelerate your SOC Analyst journey by developing skills in critical areas like log analysis and SOC Operations, while preparing for Security+ certification..
Already a Tier 1 Analyst, Junior Analyst?
Check our Catalog and let us help sharpen your skills
A Security Operations Center Analyst (SOC Analyst) stands as a front line of defense against the ever present cyber threats faced by organizations today. A SOC team ensures an organization’s digital assets remain secure and protected from unauthorized access by monitoring and responding to massive amounts of data in record time. In this role, you will protect your organization’s infrastructure by monitoring data to identify suspicious activity, then mitigating risks before a breach occurs. Cybrary's Become a SOC Analyst - Level 1 career path will equip you to break into the field with skills aligned to the US National Institute of Standards and Technology's Cyber Defense Analyst NICE work role.
Frequently Asked Questions
How Long Will It Take To Be Job Ready?
I can dedicate
hours per week
What Our Learners Are saying
"Cybrary has enabled me to develop new skills and gain experience with tools that I’ve needed to utilize in order to support my clients"
"I encourage anyone I meet, [who is] interested in a career in cybersecurity, to sign up for [Cybrary] Insider Pro. There is nothing out there capable of getting someone as job-ready as this program."
"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree."
Average Salary via Payscale.com
What Will I Learn?
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Additional Skills You Will Gain
Cyber Defense Infrastructure
Operating System Hardening
OWASP Top 10
Cyber Threat Analysis