Security Operations (SOC) 201

Take your SOC skills to the next level with our intermediate-level course focusing on incident response and threat hunting.

Training for a team or organization? Contact us about group access.

SOC 201

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Intermediate
  • Duration: 25h
  • Access: Included in Membership

Overview

Security Operations (SOC) 201 is an intermediate-level security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next logical step is to progress your career by applying advanced investigation methodologies and grasping the responsibilities of an Incident Responder and Threat Hunter.

The SOC 201 curriculum teaches analysts how to identify, hunt, and respond to real-world adversary tactics and techniques. With a practical, hands-on focus, the curriculum provides realistic scenarios where students investigate sophisticated threats across multiple systems, learning to detect and respond effectively in enterprise-scale environments. The course also integrates proactive threat hunting as part of a continuous detection and response cycle, giving analysts the mental models to identify active threats, uncover gaps, and feed insights back into investigative processes to improve future detection and response efforts.

Key Topics

  • Developing an investigator’s methodology
  • Incident Response
  • Threat Hunting
  • Data transformation techniques
  • Understanding and identifying anomalies
  • Evidence collection and handling at scale
  • Using PowerShell for Incident Response
  • Hunting and responding to advanced threats following MITRE ATT&CK TTPs
  • Incident investigation and root cause analysis

Live Training Available for This Topic

Looking to go deeper? This course aligns with upcoming instructor-led sessions covering real-world applications and guided labs.

Objectives

Develop a Methodology for Incident Response:

  • Develop a robust and reliable investigator’s mindset to approach incidents methodically.

Develop a Threat Hunting Methodology:

  • Learn industry-standard methodologies and tools for detecting, hunting, and responding to cyber threats across enterprise environments

Perform Incident Response & Threat Hunting:

  • Gain experience performing incident response and threat hunting at scale.

Using the MITRE ATT&CK Framework to Investigate Events:

  • Learn to investigate and identify advanced adversary tactics following the MITRE ATT&CK framework, including execution artifacts, lateral movement, credential theft, living off the land techniques, persistence, defense evasion, command and control, and many more.

Investigating Security Incidents:

  • Investigate the root cause of security incidents by uncovering the entry points, scoping compromised systems, and initial attack vectors.

System Requirements

To get the most out of this course and follow along with the labs, there will be times where you need to run multiple (2-3) virtual machines (VMs) simultaneously.

Your BIOS must have virtualization technology enabled, such as Intel-VTx or AMD-V.

Processor: 64-bit Intel i5 or i7, 2.0 GHz or higher.

RAM: 16GB of RAM or more is required to efficiently run multiple VMs.

Disk Space: 250 GB of free storage. SSDs are recommended for better performance.

Note: Apple Silicon devices cannot perform the necessary virtualization natively. Hardware with native x86 support is highly recommended.

Prerequisites

This course relies heavily on working with IR investigations and forensic artifacts, but does not cover learning basic analysis tools. It is strongly recommended to have taken or be familiar with the Security Operations (SOC) 101 material and its prerequisites, which includes experience with:

  • Networking & Operating System Fundamentals:
  •  Practical Help Desk (PHD) or equivalent
  • Security Operations Fundamentals
  • Network Traffic Analysis
  • Endpoint Security Monitoring
  • Log Analysis and Management
  • Security Information and Event Management (SIEM)
  • Familiarity with common Windows-based digital forensic artifacts

Recommended For

SOC 201 is designed for individuals seeking to advance their defensive security skills beyond foundational knowledge. Ideal candidates include those already familiar with core SOC concepts who are ready to develop expertise in investigating and responding to sophisticated cyber threats.

This course is well-suited for:

  • Tier 2 Security/SOC Analysts
  • Tier 3 Security/SOC Analysts
  • Incident Responders
  • Threat Hunters
  • Digital Forensic Examiners

Course Curriculum

  • Course Introduction
    • Course Introduction
    • About the Instructor
    • The Modern Adversary
    • The SOC 201 Methodology
    • Course Support
    • ✏️ Quiz – Course Introduction
  • Lab Setup
    • Lab Setup
    • Installing a Hypervisor
    • Installing Ubuntu
    • Configuring Ubuntu
    • Installing Windows
    • Configuring Windows
    • Installing Splunk
    • Configuring the Lab Network
  • Introduction to Incident Response
    • Introduction to Incident Response
    • The Incident Response Process
    • Incident Response: Preparation
    • Incident Response: Identification
    • Incident Response: Containment
    • Incident Response: Eradication
    • Incident Response: Recovery
    • Incident Response: Lessons Learned
    • The OODA Loop
    • Incident Response vs. Threat Hunting
    • ✏️ Quiz – Introduction to Incident Response
  • Introduction to Threat Hunting
    • Introduction to Threat Hunting
    • The Argument for Threat Hunting
    • Threat Hunting Teams
    • Threat Hunting Data Sources
    • The Hunting Maturity Model (HMM)
    • Cyber Threat Intelligence
    • The Cyber Kill Chain
    • The MITRE ATT&CK Framework
    • Exploring MITRE ATT&CK
    • Structured Threat Hunting
    • Unstructured Threat Hunting
    • MITRE ATT&CK Navigator
    • MITRE ATT&CK Navigator: Gap Analysis and Threat Hunting
  • Data Transformation
    • Data Transformation
    • Data Transformation: Searching
    • Searching in the Command-Line
    • Searching in PowerShell
    • Searching in Splunk
    • Data Transformation: Aggregations
    • Aggregations in the Command-Line
    • Aggregations in PowerShell
    • Aggregations in Splunk
    • Data Transformation: Statistics
    • Statistics in the Command-Line
    • Statistics in PowerShell
    • Statistics in Splunk
    • Data Transformation: Visualizations
    • Visualizations in Splunk
    • ✏️ Quiz – Introduction to Threat Hunting
  • Understanding Anomalies
    • Understanding Anomalies
    • Categorizing Anomalies
    • Masquerading
    • Ambiguous Identifiers
    • Frequency & Volume Anomalies
    • Temporal Anomalies
    • Location & Environment Anomalies
    • Structure & Format Anomalies
    • Obfuscated PowerShell Analysis
    • Entropy Analysis
    • Alternate Data Stream (ADS) Analysis
    • Absence & Suppression Anomalies
    • ✏️ Quiz – Understanding Anomalies
  • Dissecting Threat Reports
    • Dissecting Threat Reports
    • Breaking Down Attack Steps
    • Mapping Steps to Artifacts
    • Mapping Artifacts to Evidence Sources
    • Visualizing with MITRE ATT&CK Navigator
    • Intrusion Analysis Resources
  • Threat Hunting Lab
    • Tracing an Attack Chain
    • Hunting Execution Artifacts
    • Hunting PowerShell Execution
    • Hunting Cmd Execution
    • Hunting Process Trees
    • Hunting Persistence Artifacts
    • Hunting Persistence: Registry Run Keys
    • Hunting Persistence: Lookup Tables
    • Hunting Defense Evasion Artifacts
    • Hunting Command and Control (C2) Artifacts
    • Hunting C2: Ingress Tool Transfer (LOLBAS)
    • Hunting C2: Ingress Tool Transfer (File System Events)
    • Hunting C2: Ingress Tool Transfer (Network Connection Events)
    • Hunting Lateral Movement Artifacts
    • Hunting Lateral Movement: PsExec (Service Creation)
    • Hunting Lateral Movement: PsExec (Reversing Regex)
    • Hunting Lateral Movement: PsExec (Named Pipes)
    • Module Recap
  • Collection at Scale
    • Introduction to Collection
    • Introduction to WMI
    • Collection with WMIC
    • WMIC Collection and Filter Examples
    • Remote Collection with WMIC
    • Scripting WMI Collection
    • WMI Automated Collection Frameworks
  • PowerShell 101
    • Introduction to PowerShell
    • PowerShell 101
    • PowerShell 101: Cmdlets
    • PowerShell 101: Aliases
    • PowerShell 101: Objects and the Pipeline
    • PowerShell 101: Selecting, Sorting, and Formatting
    • PowerShell 101: Providers
    • PowerShell 101: Variables and Data Types
    • PowerShell 101: Control Flow
    • Working with WMI and CIM
    • ✏️ Quiz – PowerShell 101
  • PowerShell for Incident Response
    • Live Incident Response Using PowerShell
    • PowerShell Incident Response Cheat Sheet
    • PowerShell Remoting
    • PS Remoting: One-to-One Remoting
    • PS Remoting: One-to-Many Remoting
    • PS Remoting: Script Execution at Scale
    • PowerShell Authentication
    • Malicious PowerShell Usage
    • Introduction to the Kansa IR Framework
    • Kansa: Modules
    • Kansa: Remote Collection (Part 1)
    • Kansa: Remote Collection (Part 2)
    • Kansa: Collection Analysis
    • Collection and Analysis Challenge
    • Collection Analysis Challenge Walkthrough
  • Conclusion
    • Course Wrap Up

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Security Operations SOC 201, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Andrew Prince

Andrew Prince

Andrew is a seasoned and passionate security professional who brings a wealth of experience in areas such as security operations, incident response, threat hunting, vulnerability management, and cloud infrastructure security.

With a professional background in development and system administration, Andrew offers a well-rounded perspective on his security strategy. Andrew also navigates both offensive and defensive operations to provide a holistic approach to keeping people, processes, and technology secure. He is also active in developing various Capture the Flag challenges, creating security training, and sharing knowledge through content creation.

Prepare for the Practical SOC Analyst Professional (PSAP) Exam

The PSAP certification will assess a student’s ability to identify, analyze, and respond to a realistic compromise scenario.


Pair the Security Operations (SOC) 201 course with the PSAP exam to validate your skills with a recognized credential.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA