π Table of Contents:
π‘οΈ
Module 1: Foundations of SOC, SIEM, & Log Analysis (5 Hours)
πΉ Understanding SOC Operations &
SIEM Role
πΉ Introduction to Splunk & Google Chronicle (Use Cases & Architecture)
πΉ Types of Security Logs & Event Sources (Windows, Network, Cloud, Endpoint)
πΉ Hands-on Lab: Setting Up Log Ingestion in Splunk & Chronicle
π
Module 2: Understanding Log Sources & Data Normalization (6 Hours)
πΉ Log Parsing & Data Enrichment in SIEM
πΉ Working with Windows Event Logs & Sysmon
πΉ Understanding DNS, Proxy, Firewall & Cloud Logs (AWS, GCP, Azure)
πΉ Hands-on Lab: Extracting & Normalizing Logs in Splunk & Chronicle
βοΈ
Module 3: SIEM Rule Writing Basics (7 Hours)
πΉ Understanding Rule Logic & Correlation Rules
πΉ Writing Basic SPL Queries in Splunk
πΉ Building Chronicle YARA-L Detections
πΉ Hands-on Lab: Creating Simple Detection Rules in Splunk & Chronicle
π
Module 4: Advanced Rule Writing & Sigma Framework (7 Hours)
πΉ MITRE ATT&CK Framework & Detection Rule Mapping
πΉ Writing & Converting Sigma Rules to Splunk & Chronicle
πΉ Optimizing & Fine-Tuning SIEM Alerts to Reduce False Positives
πΉ Hands-on Lab: Implementing Advanced SIEM Rules & ATT&CK Mappings
π€
Module 5: Security Automation with Python & PowerShell (8 Hours)
πΉ Using Python for Log Parsing & Data Extraction
πΉ PowerShell for Windows Log Analysis & Detection Engineering
πΉ Automating Security Workflows with SIEM APIs
πΉ Hands-on Lab: Automating SIEM Query Execution with Python & PowerShell
π
Module 6: Threat Detection & Adversary Emulation (6 Hours)
πΉ Simulating Attacks Using Atomic Red Team
πΉ Detecting Ransomware, Phishing, & Living Off The Land (LOLBins) Attacks
πΉ Threat Hunting for AI-Powered Phishing & Deepfake Attacks
πΉ Hands-on Lab: Writing SIEM Rules to Detect Red Team Activities
π
Module 7: Playbook Development & SOC Automation (6 Hours)
πΉ Writing Incident Response Playbooks for SIEM & SOAR
πΉ Splunk Phantom & Chronicle SOAR Automation Overview
πΉ Automating Phishing & Insider Threat Detection
πΉ Hands-on Lab: Creating a Playbook for Automated Threat Response
π οΈ
Module 8: Final Capstone Project & Certification (5 Hours)
πΉ Simulated SOC Challenge: Detect & Respond to an Ongoing Attack
πΉ Hands-on Practical Assessment: End-to-End SIEM Rule Creation & Automation
πΉ Final SIEM Rule & Playbook Submission
πΉ Certification & Career Guidance for Detection Engineers & SOC Analysts