🔓
PURPLEBYTEONE
search
Ctrlk
  • main
  • Noteschevron-right
    • Educationchevron-right
      • Basechevron-right
        • Information Technologychevron-right
        • Purple Teamchevron-right
          • Splunkchevron-right
          • Security Team Bluechevron-right
          • ISC2chevron-right
          • TCM Securitychevron-right
          • Courserachevron-right
          • ICSI Global
          • OccupyTheWebchevron-right
          • CompTIAchevron-right
          • EC-Councilchevron-right
          • Intel Techniqueschevron-right
          • SANSchevron-right
          • IBMchevron-right
          • Cybrarychevron-right
          • Zero Point Securitychevron-right
          • Web Security Academychevron-right
          • INEchevron-right
          • Pentester Lab
          • Pentester Academychevron-right
          • Offensive Securitychevron-right
          • Sektor7chevron-right
          • Black Hatchevron-right
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTubechevron-right
          • Udemychevron-right
          • AntiSyphon
          • THMchevron-right
          • HTBchevron-right
            • HTB Academychevron-right
              • Job Role Pathchevron-right
                • Penetration Testerchevron-right
                • SOC Analystchevron-right
                  • Incident Handling Processchevron-right
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challengeschevron-right
            • Machineschevron-right
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinitychevron-right
    • Carrierchevron-right
    • Notechevron-right
  • Roadmapchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. Educationchevron-right
  3. Basechevron-right
  4. Purple Teamchevron-right
  5. HTBchevron-right
  6. HTB Academychevron-right
  7. Job Role Path

SOC Analyst

Incident Handling Processchevron-rightSecurity Monitoring & SIEM Fundamentalschevron-rightWindows Event Logs & Finding Evilchevron-rightIntroduction to Threat Hunting & Hunting With Elasticchevron-rightUnderstanding Log Sources & Investigating with Splunkchevron-rightWindows Attacks & Defensechevron-rightIntro to Network Traffic Analysischevron-rightIntermediate Network Traffic Analysischevron-rightWorking with IDS/IPSchevron-rightIntroduction to Malware Analysischevron-rightJavaScript Deobfuscationchevron-rightYARA & Sigma for SOC Analystschevron-rightIntroduction to Digital Forensicschevron-rightDetecting Windows Attacks with Splunkchevron-rightSecurity Incident Reportingchevron-right