Join us for Wild West Hackin’ Fest Mile High conference! Register Here

SOC Core Skills with John Strand

Course Authored by .

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have.

On-Demand $225 - $575

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have.

In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst is always in demand. From the basics of networking to forensics and incident response, this course will give you the same required skills as the Black Hills Information Security (BHIS) SOC team. Learn from John Strand as he teaches the basics of what you need to know to be a successful SOC analyst! Learn at your own pace with our On-Demand training or take our Live, Pay What You Can training!

System Requirements
  • Student Requirements
    • A system with a browser and solid internet connection

FAQ

Key Takeaways
• Core networking skills
• Live Windows Forensics
• Live Linux Forensics
• Memory Forensics
• Active Directory Analysis
• Network Threat Hunting
• Basics of Vulnerability Management
• The Incident Response Process

About the Instructor

Pixel splash background
John Strand
John Strand
"Managing Intern for all things Black Hills Information Security"
Bio

John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.