CSA| Certified SOC Analyst

Master the Skills of a Modern SOC Analyst (CSA)Program

The Certified SOC Analyst (C|SA v2) program is a comprehensive, job-ready certification that prepares you to detect, investigate, and respond to cybersecurity threats in Security Operations Centers (SOCs). With strong coverage of SIEM, threat intelligence, proactive detection, and AI-driven automation, this program gives you the practical expertise to run modern SOC operations at Levels 1, 2, and even 3.

Key Features & Benefits

Globally recognized, ANAB-accredited certification

Approved by U.S. DoD 8140 / 8570 and mapped to NICE Cybersecurity Workforce Framework

Covers SOC levels L1–L3, including advanced detection and response workflows

Strong focus on SIEM use cases – 350+ use cases across ArcSight, QRadar, Splunk, LogRhythm, Elastic

Hands-on training – 50+ labs, 120+ SOC tools, with over 50% of the course dedicated to labs

AI-powered SOC skills – leverage Splunk AI, Elastic AI, ChatGPT, Copilot, and PowerShell AI for detection and hunting

Covers on-premises and cloud SOC – AWS, Azure, GCP monitoring and response

Job-ready design – built with industry SMEs to match SOC Analyst job tasks (L1, L2, L3)

Course Outline

Select a module to explore detailed content:

Learn how a Security Operations Center (SOC) works, its role in protecting organizations, and the people, processes, and technologies behind it.

Hands-on Labs: 

Explore a SOC environment, review SOC roles and workflows, and simulate monitoring activities.

Key topics covered: SOC structures (in-house, outsourced, hybrid), SOC maturity models, KPIs, security management processes, and challenges in SOC operations.

Understand how attackers operate, the techniques they use, and how to recognize the warning signs they leave behind.

Hands-on Labs: 

Identify IoCs from sample attack scenarios and analyze threat intelligence reports.

Key topics covered: Common cyberattacks, attacker tactics and procedures (TTPs), Indicators of Compromise (IoCs), and frameworks like MITRE ATT&CK and Cyber Kill Chain.

Learn how to collect, manage, and analyze logs that provide critical evidence for detecting attacks.

Hands-on Labs: 

Collect and analyze logs from multiple systems, configure centralized log management, and detect suspicious activity in log data.

Key topics covered: Log sources (Windows, Linux, firewall, IDS/IPS, databases, applications), centralized log management, parsing, normalization, and correlation.

Detect and prioritize security incidents quickly using SIEM and triage methods.

Hands-on Labs: 

Configure SIEM rules, triage alerts, investigate anomalies, and generate incident reports.

Key topics covered: SIEM concepts, SIEM solutions (Splunk, QRadar, ArcSight, Elastic, LogRhythm), deployment strategies, use case development, alert management, dashboards, and reporting.

Go beyond reactive monitoring by using threat intelligence and hunting to anticipate attacks.

Hands-on Labs: 

Perform threat hunting exercises, create YARA rules, use PowerShell for hunting, and apply AI-based hunting tools.

Key topics covered: Threat intelligence lifecycle, OSINT, threat hunting frameworks, proactive defense strategies, and AI-driven hunting methods.

Master the structured approach to containing, eradicating, and recovering from incidents.

Hands-on Labs: 

Use a ticketing system to document incidents, follow an incident playbook, and simulate containment and recovery.

Key topics covered: Incident response lifecycle, ticketing systems, severity classification, SOC and IRT collaboration, playbooks, and SOAR automation.

Learn how to preserve digital evidence, investigate incidents, and analyze malware behavior.

Hands-on Labs: 

Perform forensic memory analysis, analyze malware samples, and use sandbox environments to study malicious behavior.

Key topics covered: Forensic investigation methodology, evidence collection, static and dynamic malware analysis, forensic tools (Volatility, Redline, ANY.RUN).

Discover how SOC analysts monitor and respond to threats in cloud environments like AWS, Azure, and Google Cloud.

Hands-on Labs: 

Configure cloud-native monitoring tools, analyze cloud logs, and investigate a simulated cloud attack.

Key topics covered: Cloud SOC challenges, monitoring strategies, native cloud tools (Microsoft Sentinel, AWS GuardDuty, Google Chronicle), compliance requirements, and cloud forensics.

Our Partners & Vendors

Ready to grow your cybersecurity team?

Get expert guidance on upskilling your team and building a cybersecurity workforce tailored to your business needs.

Training Prerequisites

Core Knowledge

Basic understanding of computer networks and how they function.

Familiarity with cybersecurity concepts such as threats, vulnerabilities, and risk management.

Awareness of the role of a Security Operations Center (SOC) in defending organizations.

Technical Skills

Knowledge of IP addressing, routing, and core network protocols (TCP/IP, DNS, DHCP, ARP, ICMP).

Ability to use basic network troubleshooting tools (ping, traceroute, nslookup, netstat).

Understanding of common attack types (malware, phishing, denial of service, insider threats).

OS & Tools

Comfortable using Windows and Linux operating systems.

Ability to install software packages and use command-line tools.

Basic knowledge of file systems, permissions, and user management.

Familiarity with security tools (firewalls, IDS/IPS, or SIEM solutions) is recommended but not mandatory.

Training & Register Details

TRAINING OVERVIEW

Certified SOC Analyst v2

Equip your team to detect, investigate, and stop cyber threat

Training Duration: 3 days (24 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline

Certification: INCLUDED

HOW TO REGISTER

1. Submit Your Application

Basic understanding of computer networks and protocols.

2. Intro Call

We’ll schedule a short call to learn more about your goals and expectations.

3. Confirm Your Spot

Get accepted and complete the paperwork. We’ll send you all the info you need.

4. Start Learning

Access your learning platform and get familiar with the materials.

5. Join the Community

Get access to the student chat, events, and mentorship opportunities.

Who is CSA for?

Aspiring SOC Analysts

Gain the essential skills to start your career in Security Operations Centers with hands-on training and certification.

SOC Teams & Enterprises

Enhance detection, investigation, and response capabilities to strengthen your organization’s security posture.

Government & Defense

Trusted by agencies worldwide to build skilled SOC professionals for national and critical infrastructure protection.

Educators & Trainers

Integrate globally recognized SOC training into academic programs and professional cybersecurity courses.

FAQ

C|SA v2 is EC-Council’s globally recognized certification that trains you in the skills needed to detect, investigate, and respond to cybersecurity threats in a Security Operations Center (SOC).

The course is designed for aspiring SOC analysts, cybersecurity professionals, SOC teams, government agencies, and educators who want to build or strengthen SOC capabilities.

Yes, a basic understanding of networks, operating systems, and cybersecurity concepts is recommended. Familiarity with tools like firewalls, IDS/IPS, or SIEM is helpful but not mandatory.

Very practical — with 50+ hands-on labs and 120+ tools, over half of the training time is spent practicing real SOC tasks in simulated environments.

After completing the training and passing the exam (312-39), you will earn the Certified SOC Analyst (C|SA v2) certification, accredited by ANSI/ANAB and recognized worldwide.

The exam has 100 multiple-choice questions, lasts 3 hours, and is delivered online via the EC-Council exam portal.

Start Your Journey With Us

Ready to grow your skills or start a new career in cybersecurity?
Leave your contact details, and our experts will get back to you shortly — whether you need help choosing the right course or certification program, or want details about enrollment and schedules.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
Scroll to Top

Let’s Talk About Your Project

Need a consultation or more information? We’re here to help!
Leave your contact details, and our experts will get back to you shortly — whether it’s about choosing the right cybersecurity services, training your team, or getting certified.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.
By clicking "Request a Consultation", you consent to the processing of your personal data in line with our Privacy Policy.