Security Operations (SOC) 201

Take your SOC skills to the next level with our intermediate-level course focusing on incident response and threat hunting.

Training for a team or organization? Contact us about group access.

SOC 201

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Intermediate
  • Duration: 25h
  • Access: Included in Membership

Overview

Security Operations (SOC) 201 is an intermediate-level security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next logical step is to progress your career by applying advanced investigation methodologies and grasping the responsibilities of an Incident Responder and Threat Hunter.

The SOC 201 curriculum teaches analysts how to identify, hunt, and respond to real-world adversary tactics and techniques. With a practical, hands-on focus, the curriculum provides realistic scenarios where students investigate sophisticated threats across multiple systems, learning to detect and respond effectively in enterprise-scale environments. The course also integrates proactive threat hunting as part of a continuous detection and response cycle, giving analysts the mental models to identify active threats, uncover gaps, and feed insights back into investigative processes to improve future detection and response efforts.

Key Topics

  • Developing an investigator’s methodology
  • Incident Response
  • Threat Hunting
  • Data transformation techniques
  • Understanding and identifying anomalies
  • Evidence collection and handling at scale
  • Using PowerShell for Incident Response
  • Hunting and responding to advanced threats following MITRE ATT&CK TTPs
  • Incident investigation and root cause analysis

Live Training Available for This Topic

Looking to go deeper? This course aligns with upcoming instructor-led sessions covering real-world applications and guided labs.

Objectives

Develop a Methodology for Incident Response:

  • Develop a robust and reliable investigator’s mindset to approach incidents methodically.

Develop a Threat Hunting Methodology:

  • Learn industry-standard methodologies and tools for detecting, hunting, and responding to cyber threats across enterprise environments

Perform Incident Response & Threat Hunting:

  • Gain experience performing incident response and threat hunting at scale.

Using the MITRE ATT&CK Framework to Investigate Events:

  • Learn to investigate and identify advanced adversary tactics following the MITRE ATT&CK framework, including execution artifacts, lateral movement, credential theft, living off the land techniques, persistence, defense evasion, command and control, and many more.

Investigating Security Incidents:

  • Investigate the root cause of security incidents by uncovering the entry points, scoping compromised systems, and initial attack vectors.

System Requirements

To get the most out of this course and follow along with the labs, there will be times where you need to run multiple (2-3) virtual machines (VMs) simultaneously.

Your BIOS must have virtualization technology enabled, such as Intel-VTx or AMD-V.

Processor: 64-bit Intel i5 or i7, 2.0 GHz or higher.

RAM: 16GB of RAM or more is required to efficiently run multiple VMs.

Disk Space: 250 GB of free storage. SSDs are recommended for better performance.

Note: Apple Silicon devices cannot perform the necessary virtualization natively. Hardware with native x86 support is highly recommended.

Prerequisites

This course relies heavily on working with IR investigations and forensic artifacts, but does not cover learning basic analysis tools. It is strongly recommended to have taken or be familiar with the Security Operations (SOC) 101 material and its prerequisites, which includes experience with:

  • Networking & Operating System Fundamentals:
  •  Practical Help Desk (PHD) or equivalent
  • Security Operations Fundamentals
  • Network Traffic Analysis
  • Endpoint Security Monitoring
  • Log Analysis and Management
  • Security Information and Event Management (SIEM)
  • Familiarity with common Windows-based digital forensic artifacts

Recommended For

SOC 201 is designed for individuals seeking to advance their defensive security skills beyond foundational knowledge. Ideal candidates include those already familiar with core SOC concepts who are ready to develop expertise in investigating and responding to sophisticated cyber threats.

This course is well-suited for:

  • Tier 2 Security/SOC Analysts
  • Tier 3 Security/SOC Analysts
  • Incident Responders
  • Threat Hunters
  • Digital Forensic Examiners

Course Curriculum

  • Introduction
    • Course Introduction
    • Prerequisites and Course Resources
    • Course Discord and Support
  • Lab Setup
    • Installing Oracle VM VirtualBox
    • Installing Windows
    • Configuring Windows
    • Installing Ubuntu
    • Configuring Ubuntu
    • Configuring the Lab Network
  • Security Operations Fundamentals
    • The SOC and Its Role
    • Day in the Life of a SOC Analyst
    • Information Security Refresher
    • SOC Models, Roles, and Organizational Structures
    • Incident and Event Management
    • SOC Metrics
    • SOC Tools
    • Common Threats and Attacks
    • ✏️ Quiz – Security Operations Fundamentals
  • Phishing Analysis
    • Introduction to Phishing
    • Email Fundamentals
    • Phishing Analysis Configuration
    • Phishing Attack Types
    • Phishing Attack Techniques
    • Email Analysis Methodology
    • Email Header and Sender Analysis
    • Email Authentication Methods
    • Email Content Analysis
    • The Anatomy of a URL
    • Email URL Analysis
    • Email Attachment Analysis
    • Dynamic Attachment Analysis and Sandboxing
    • Static MalDoc Analysis
    • Static PDF Analysis
    • Automated Email Analysis with PhishTool
    • Reactive Phishing Defense
    • Proactive Phishing Defense
    • Documentation and Reporting
    • 🧪 Phishing Analysis Challenge 1
    • 🧪 Phishing Analysis Challenge 2
    • 🧪 Phishing Analysis Challenge 3
    • Additional Practice
    • ✏️ Quiz – Phishing Analysis
  • Network Security
    • Introduction to Network Security
    • Network Security Theory
    • Packet Capture and Flow Analysis
    • Introduction to tcpdump
    • tcpdump: Capturing Network Traffic
    • tcpdump: Analyzing Network Traffic
    • tcpdump: Analyzing Network Traffic (Sample 2)
    • 🧪 tcpdump Challenge 1
    • Introduction to Wireshark
    • Wireshark: Capture and Display Filters
    • Wireshark: Statistics
    • Wireshark: Analyzing Network Traffic
    • 🧪 Wireshark Challenge 1
    • Intrusion Detection and Prevention Systems
    • Introduction to Snort
    • Snort: Reading and Writing Rules
    • Snort: Intrusion Detection and Prevention
    • 🧪 Snort Challenge 1
    • Additional Practice
    • ✏️ Quiz – Network Security
  • Endpoint Security
    • Introduction to Endpoint Security
    • Endpoint Security Controls
    • Creating Our Malware
    • Windows Network Analysis
    • Windows Process Analysis
    • Windows Core Processes (Part 1)
    • Windows Core Processes (Part 2)
    • The Windows Registry
    • Windows Autoruns (Part 1)
    • Windows Autoruns (Part 2)
    • Windows Service Analysis
    • Windows Scheduled Tasks
    • 🧪 Windows Endpoint Analysis Challenge 1
    • Windows Event Logs
    • 🧪 Windows Events Challenge 1
    • Introduction to Sysmon
    • Sysmon Events
    • Linux Network Analysis
    • Linux Process Analysis
    • Linux Cron Jobs
    • 🧪 Linux Endpoint Analysis Challenge 1
    • Introduction to LimaCharlie
    • LimaCharlie: Endpoint Detection and Response
    • LimaCharlie: Deploying Endpoint Agents
    • ✏️ Quiz – Endpoint Security
  • Security Information and Event Management (SIEM)
    • Introduction to SIEM and Log Management
    • SIEM Architecture
    • SIEM Deployment Models
    • Log Types
    • Log Formats
    • Common Attack Signatures: User Behavior
    • Common Attack Signatures: SQL Injection
    • Common Attack Signatures: Cross-Site Scripting
    • Common Attack Signatures: Command Injection
    • Common Attack Signatures: Path Traversal and Local File Inclusion
    • Command Line Log Analysis
    • Pattern Matching
    • Structured Log Analysis
    • 🧪 Log Analysis Challenge 1
    • Introduction to Splunk
    • Splunk: Initial Walkthrough
    • Splunk: Importing and Exploring Events
    • Splunk: Search Processing Language (SPL)
    • Splunk: Search Commands
    • Splunk: Reports and Alerts
    • Splunk: Creating Dashboards
    • 🧪 [Live] Splunk: Website Defacement Investigation
    • 🧪 Splunk: Ransomware Challenge
    • Splunk: Deploying a Forwarder and Generating Real-Time Alerts
    • Section Cleanup
    • ✏️ Quiz – SIEM
  • Threat Intelligence
    • Introduction to Threat Intelligence
    • Types of Threat Intelligence
    • The Threat Intelligence Cycle
    • The Diamond Model of Intrusion Analysis
    • The Cyber Kill Chain
    • The Pyramid of Pain
    • MITRE ATT&CK
    • 🧪 MITRE ATT&CK Challenge 1
    • Introduction to YARA
    • YARA: Reading and Writing Rules (Part 1)
    • YARA: Reading and Writing Rules (Part 2)
    • 🧪 YARA Challenge 1
    • Introduction to MISP (Malware Information Sharing Platform)
    • MISP: Event Management
    • MISP: Ingesting Threat Intelligence Feeds
    • ✏️ Quiz – Threat Intelligence
  • Digital Forensics
    • Introduction to Digital Forensics
    • The Digital Forensics Investigation Process
    • Order of Volatility
    • Chain of Custody
    • Introduction to FTK Imager
    • FTK Imager: Forensic Image Acquisition
    • FTK Imager: Memory Acquisition
    • Common Windows Forensic Artifacts
    • Windows Forensic Artifacts: User and System
    • Windows Forensic Artifacts: Files
    • Windows Forensic Artifacts: Program Execution
    • LNK Files, Prefetch Files, and Jump Lists
    • Windows Forensic Artifact Triage
    • Introduction to Volatility
    • Volatility: Memory Analysis
    • Volatility: Network Memory Analysis
    • Volatility: Process Memory Analysis
    • Volatility: Registry Memory Analysis
    • 🧪 Volatility Challenge 1
    • ✏️ Quiz – Digital Forensics
  • Incident Response
    • Introduction to Incident Response
    • Incident Response Frameworks
    • Preparation
    • Identification
    • Containment
    • Eradication
    • Recovery
    • Lessons Learned
    • ✏️ Quiz – Incident Response
  • Conclusion
    • Course Wrap Up
    • Next Steps: Practical SOC Analyst Associate (PSAA)

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Security Operations SOC 201, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Andrew Prince

Andrew Prince

Andrew is a seasoned and passionate security professional who brings a wealth of experience in areas such as security operations, incident response, threat hunting, vulnerability management, and cloud infrastructure security.

With a professional background in development and system administration, Andrew offers a well-rounded perspective on his security strategy. Andrew also navigates both offensive and defensive operations to provide a holistic approach to keeping people, processes, and technology secure. He is also active in developing various Capture the Flag challenges, creating security training, and sharing knowledge through content creation.

Prepare for the Practical SOC Analyst Professional (PSAP) Exam

The PSAP certification will assess a student’s ability to identify, analyze, and respond to a realistic compromise scenario.


Pair the Security Operations (SOC) 201 course with the PSAP exam to validate your skills with a recognized credential.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA