Cyber Defense Courses

  • From entry level SOC training to deep dives in APT’s, threat hunting, threat intelligence and incident response.
  • Delivered in a modern SOC with the full technology stack deployed and working together.

In 2016, Rob van Os created the SOC Maturity Model (SOC-CMM) as his Master’s thesis research project. Today, his model is used by cyber defense teams worldwide to benchmark and improve their capabilities. Rob teamed up with the SECO-Institute and co- authored the entry level SOC Analyst course, laying the foundation for the Cyber Defense track. With Carlos Valderrama joining the development team, SECO built the advanced Threat Analyst course that dives deep into active defense and hands on practice of threat intelligence, threat hunting and incident response investigations. Today, these courses are attended by the big – as well as niche and specialized advisories, SOC/CSIRT Capacity Builders, National Cyber Security Centers, enterprise SOC Teams and leading Managed Service and MDR Providers. The courses help them onboard new team members, challenge their senior employees and offer them the possibility to progress in their career.

“I had high expectations from this course and I was not disappointed. From the course materials, the lab environment and the instructor, it was great. The instructor is very experienced and thorough, and the course covers exactly those activities and challenges that we deal with on our SOC. Great training packed with realistic and practical scenario’s”

Jarek Sordyl, National Cyber Security Center, Poland

In partnership with CyberNForce, SECO’s cyber defense courses are now available in Spain, each one with its own accredited examination. Trainings are delivered under the guidance of one of SECO’s lead trainers and co-author of both courses:

Lead Trainer

Author of the SOC Analyst and Threat Analyst Training
SOC Director and Subject Matter Expert ENISA

Carlos is a Cybersecurity expert with more than 20 years of experience in Computer Forensics, Incident Response, Malware Analysis and Threat Intelligence for IT and OT environments. Currently he is SOC Director at Proficio and IoT Expert selected by the European Community Cybersecurity Agency (ENISA) to define the security framework for Industrial IoT, critical infrastructures, smart cities, smart manufacturing, among others.

Carlos started his career as a penetration tester and soon realised his passion laid in Computer Forensics and Incident Response, which led him on his path to become a passionate expert in Cybersecurity Operations.

He has worked on large-scale international cyber investigations, participated in responding to attacks from renowned campaigns and cyber criminals, and has created several Cybersecurity and Forensics tools. He has built and participated on improving and modernising several countrywide and global SOCs for MSSPs and private and public organisations.

Carlos is a passionate tutor. He frequently speaks at Cybersecurity conferences, trained law enforcement groups in many countries and mentors university and military study programs.

Select your Training:

Entry level

Associate SOC Analyst

3 Days

Aimed at new and junior SOC Analysts, and SOC and cyber defense Teams that are looking to onboard new team members and / or looking to set a baseline for their Tier 1 Analysts.

Dives deep into the mindset of the SOC Analyst, the analytical process and collaboration skills, fully integrated throughout the course and in the hands- on exercises.

Hands on experience in threat analysis, reporting and escalation. Offers an introduction to the processes of threat intelligence and threat hunting. You’ll work with your SOC – team mates on a business case where you’ll manage an incident from preparation to post-incident analysis.

Practice attacker techniques and vulnerabilities evaluation. Identify companies’ critical assets and key IT systems that you’re assigned to monitor and protect.

Practice where and how to collect and analyze data and logs. Introduction to use cases for security monitoring.

Offers hands on practice in a Virtual SOC with SIEM, ITSM and a SOC Ticketing system [the key toolset of the SOC Analyst] deployed and fully set up to work together to replicate your work environment as closely as possible.

Advanced level

Threat Analyst

5 Days

Aimed at SOC Analysts, MDR Analysts, Threat Content Developers, Security Consultants, Incident Responders, security engineers and architects, red teamers going purple.

Prepares for a new SOC paradigm to work with the modern MDR technology stack, structures your mind to transition towards a senior, pro-active defense role.

Complex investigations on escalated events, incidents, Advanced Persistent Threats Analysis. Dive deep into the hands- on practices of Threat Intelligence (including Dark Web), Threat Hunting and all stages of Incident Response investigations.

Master Attacker Techniques and Tactics. Perform Infrastructure Modelling and Risk Analysis for risk-based log ingestion strategies and investigation prioritization.

Deep dives in MAGMA, SIGMA, Snort, Zeek, YARA. Conduct blind spot detection assessments. Improve detection visibility and monitoring.

Offers hands on practice in a Next Generation SOC with a Threat Intelligence platform, Incident Response Platform, Packet capture and analysis, Automation tools, CMDB, Network and Asset Modelling and XDR.

Both courses include 3 months access to SECO’s Virtual SOC with modern technology stack and Open EDX training platform deployed. You’ll also receive a practice exam, exam voucher and a digital certification badge when you pass your final test.

More information and Training Dates

Interested? Fill out the contact form below or send an email to Julià Manzanas Mondéjar via jmanzanas@cybernforce.com

Associate SOC Analyst

Threat Analyst