🔓
PURPLEBYTEONE
Ctrlk
  • main
  • Notes
    • Education
      • Base
        • Information Technology
        • Purple Team
          • Splunk
          • Security Team Blue
          • ISC2
          • TCM Security
          • Coursera
          • ICSI Global
          • OccupyTheWeb
          • CompTIA
          • EC-Council
          • Intel Techniques
          • SANS
          • IBM
          • Cybrary
          • Zero Point Security
          • Web Security Academy
          • INE
          • Pentester Lab
          • Pentester Academy
          • Offensive Security
          • Sektor7
          • Black Hat
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTube
          • Udemy
          • AntiSyphon
          • THM
          • HTB
            • HTB Academy
              • Job Role Path
                • Penetration Tester
                • SOC Analyst
                  • Incident Handling Process
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challenges
            • Machines
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinity
    • Carrier
    • Note
  • Roadmap
Powered by GitBook
On this page
Page cover
  1. Notes
  2. Education
  3. Base
  4. Purple Team
  5. HTB
  6. HTB Academy
  7. Job Role Path

SOC Analyst

Incident Handling ProcessSecurity Monitoring & SIEM FundamentalsWindows Event Logs & Finding EvilIntroduction to Threat Hunting & Hunting With ElasticUnderstanding Log Sources & Investigating with SplunkWindows Attacks & DefenseIntro to Network Traffic AnalysisIntermediate Network Traffic AnalysisWorking with IDS/IPSIntroduction to Malware AnalysisJavaScript DeobfuscationYARA & Sigma for SOC AnalystsIntroduction to Digital ForensicsDetecting Windows Attacks with SplunkSecurity Incident Reporting