Loading...
SOC Analyst Background
New Batch Open

Start Your Career as SOC Analyst &
Threat Intelligence

Batch 1: Master the art of defensive cybersecurity. Learn to detect, analyze, and neutralize advanced threats in a real-world Security Operations Center environment.

Register Now

+0

Expert Mentors

+0

Alumni Hired

+0

Corporate Partners

0%

Success Rate

SOC Analyst Training
Career Context

Why SOC Analysts Are
In High Demand

Cyberattacks are rising by 20–40% every year, requiring constant monitoring.

Companies need defensive experts (Blue Team) who can handle real incidents.

There is a global shortage of qualified SOC Analysts & Threat Hunters.

9 Intensive Sessions

Elite SOC Curriculum

A battle-tested roadmap from networking basics to advanced threat hunting.

Session 1: The Battlefield

Defense Fundamentals & Networking

  • TCP/IP & OSI Model Deep Dive
  • Network Protocols & Ports
  • Intro to Blue Team Operations
  • Setting up the Lab
01

Session 2: Threat Intel

Know Your Enemy

  • Cyber Kill Chain Framework
  • MITRE ATT&CK Matrix
  • Pyramid of Pain
  • Threat Intelligence Platforms
02

Session 3: The Watchtower

SIEM Architecture & Logs

  • Splunk & Wazuh Architecture
  • Log Ingestion & Parsing
  • Correlation Rules
  • Building Dashboards
03

Session 4: Vuln. Management

Identifying Weaknesses

  • CVSS Scoring System
  • Scanning with Nessus/OpenVAS
  • Prioritizing Patching
  • False Positive Analysis
04

Session 5: Phishing Analysis

The #1 Attack Vector

  • Email Header Analysis
  • Malicious Attachment Forensics
  • Domain Squatting Detection
  • Business Email Compromise (BEC)
05

Session 6: Endpoint Defense

EDR & Sysmon

  • Sysinternal Tools
  • Detecting Process Injection
  • EDR Evasion Techniques
  • Baseline Anomalies
06

Session 7: Malware Basics

Dissecting the Payload

  • Static vs Dynamic Analysis
  • Sandboxing (Cuckoo/AnyRun)
  • IOC Extraction
  • Ransomware Behavior
07

Session 8: Incident Response

Containment & Forensics

  • The 6 Phases of IR
  • Evidence Acquisition
  • Chain of Custody
  • Writing the Incident Report
08

Session 9: The Final Siege

Live Blue Team Simulation

  • Defend Enterprise Network
  • Real-time Attack Detection
  • Live Containment Strategy
  • Final Debrief & Certification
09

Learning
Outcomes

After this bootcamp, you will be able to handle real-world alerts with confidence.

Threat Monitoring

Analyze alerts in real-time.

Incident Triage

Validate true positives quickly.

SIEM Management

Master correlation rules.

Incident Response

Contain threats effectively.

Arsenal & Technology

Master The Standard Industry Tools

Wireshark
Wireshark
Postman
Postman
SQLmap
SQLmap
Kali Linux
Kali Linux
VirtualBox
VirtualBox
Docker
Docker
Autopsy
Autopsy
Suricata
Suricata
OWASP ZAP
OWASP ZAP
Burp Suite
Burp Suite
Wireshark
Wireshark
Postman
Postman
SQLmap
SQLmap
Kali Linux
Kali Linux
VirtualBox
VirtualBox
Docker
Docker
Autopsy
Autopsy
Suricata
Suricata
OWASP ZAP
OWASP ZAP
Burp Suite
Burp Suite
Wireshark
Wireshark
Postman
Postman
SQLmap
SQLmap
Kali Linux
Kali Linux
VirtualBox
VirtualBox
Docker
Docker
Autopsy
Autopsy
Suricata
Suricata
OWASP ZAP
OWASP ZAP
Burp Suite
Burp Suite
Wireshark
Wireshark
Postman
Postman
SQLmap
SQLmap
Kali Linux
Kali Linux
VirtualBox
VirtualBox
Docker
Docker
Autopsy
Autopsy
Suricata
Suricata
OWASP ZAP
OWASP ZAP
Burp Suite
Burp Suite
Registration Closing Soon

Ready to Defend?

Join Batch 1 of our SOC Analyst & Threat Intelligence Bootcamp. Secure your spot today and start your journey.

00
Days
00
Hours
00
Minutes
00
Seconds

Everything You Need to Know

Target Audience+
Suitable for: SOC Analyst (junior–mid), IT Security Engineer, Blue Team Practitioner. Not for: Absolute beginners.
Program Format+
9 Sessions (2 Hours/Session), Basic-Intermediate Level. Includes theory, hands-on labs, and live simulations.
Value Proposition+
Master the art of defensive cybersecurity, not just the tools.
What services does Tunas Tech offer?+
We offer Cybersecurity Bootcamps, Penetration Testing, SOC Monitoring, and Security Audits.
What bootcamps are available at Tunas Tech?+
We are currently enrolling for SOC Analyst & Threat Intelligence Batch 1.
How does the consultation or collaboration process work?+
Contact us via WhatsApp or Email for a free initial consultation.
How can I contact Tunas Tech for consultation or service inquiries?+
Use the form on this page or click the WhatsApp button above.

Got Questions?

Have questions about our bootcamp or programs? Our team is ready reach out today!

Loading...
Tunas Tech - Jasa Pentest, SOC, & IT Audit Terbaik Indonesia & Asia