Select Page

SOC Analyst and Cybersecurity Specialist

From Fundamentals to SOC Analyst: Your Complete Cybersecurity Journey

Comprehensive program with practical skills to work in a Security Operations Center (SOC), combining a solid foundation in Ethical Hacking and Network Defense, and then specializing in the techniques and tools used by SOC Analysts to monitor, detect and respond to security incidents in real time.

The ideal path for those who want to enter the world of Cybersecurity with guarantees, learn with real scenarios and obtain certifications recognized by the industry, to make your way in one of the sectors with the greatest professional projection.

CCNA CyberOps

 

SUBSIDIZED FOR WORKERS

REQUEST MORE INFORMATION

     


    It covers key skills in hacking, defense, forensics, and operation in a Security Operations Center (SOC), one of the most in-demand profiles in private companies, public organizations, and technology service providers.


    Stand out in national and international selection processes and advance to roles of greater responsibility, such as Senior Analyst, Cybersecurity Consultant or Security Architect

     

    Official Certification

    Students gain official registration as technicians in a specific technology, which certifies them to practice their profession internationally. We certify our students worldwide.

    Job opportunities

    In a market where digital threats are growing daily, cybersecurity professionals are essential and highly valued. Companies, public administrations, and technology providers need professionals capable of monitoring, detecting, and responding to cyberattacks in real time, protecting the organization's critical systems and data. This training offers broad career opportunities, as Security Operations Centers (SOCs) operate continuously and require specialized analysts at various levels. Graduates can work as security analysts, cyber defense technicians, incident monitoring and response specialists, junior cybersecurity consultants, or intrusion detection technicians.

    Through Cloud Talent The school connects you with more than 10,000 companies and generates job and internship interviews tailored to your professional profile. The Cloud Talent Program also gives you access to other complementary SAP certifications at no cost to enhance your qualifications.

    Syllabus

    FUNDAMENTALS OF OFFENSIVE SECURITY

    Fundamentals and Basic Concepts

    • Ethical principles of hacking and legal framework.
    • Types of attackers, threats, and attack vectors.
    • Network architecture, OSI and TCP/IP models.
    • Essential protocols and services: HTTP, DNS, SMTP, FTP.
    • Introduction to Linux and Windows operating systems for auditing.

      Recognition and Information Gathering

    • Concept of footprinting and passive vs. active recognition.
    • Information gathering techniques and OSINT.
    • Network and services scanning with Nmap.
    • Identification of ports, services, and operating systems.
    • Listing objectives and analyzing results.

    Exploitation and Vulnerabilities

    • Identification and analysis of common vulnerabilities (CVE, CVSS).
    • Exploitation of typical vulnerabilities: SQL Injection, XSS, RCE.
    • Basic use of exploitation tools and frameworks.
    • Session and shell management.
    • Safe practices in controlled laboratory environments.

    Escalation of Privileges and Persistence

    • Concepts and phases of the escalation of privileges.
    • Escalation in Linux: sudoers, permissions, misconfigured scripts.
    • Escalation in Windows: services, registry keys, local exploits.
    • Basic persistence techniques: scheduled tasks, backdoors.
    • Mitigation and traceability of post-exploitation actions.

    Documentation and Best Practices

    • Structure and writing of technical audit reports.
    • Vulnerability classification and prioritization (VSS).
    • Recommendations and remediation plan.
    • Use of templates and tools for reports (OWASP, Markdown).
    • Ethics, communication and good practices of the offensive professional.
    FUNDAMENTALS OF DEFENSIVE SECURITY

    Cybersecurity Fundamentals

    • Basic concepts and CIA principles (confidentiality, integrity, availability).
    • Overview of threats and actors (internal and external).
    • Regulatory and ethical frameworks (ISO 27001, NIST, GDPR).
    • Roles in cybersecurity: SOC, analyst, pentester, incident responder.
    • Differences between offensive and defensive security.

      Networks, Protocols and Perimeter Security

    • Networking review: OSI and TCP/IP models.
    • Protocols and essential services.
    • Concepts of NAT, VLAN, VPN, Firewalls and DMZ.
    • Diagnostic and monitoring tools (ping, tracert, netstat).
    • Basic device configuration and security measures.

    Threats, Vulnerabilities and Risk Management

    • Threat classification: malware, phishing, DoS/DDoS, MITM.
    • Concepts of vulnerability and exposure (CVE).
    • Vulnerability management and risk assessment cycle.
    • Scanning tools: OpenVAS, Nessus.
    • Risk analysis and prioritization methodologies.

    Cryptography and Information Security

    • Fundamentals of encryption: symmetric and asymmetric.
    • Hashing, digital signatures and certificates.
    • Practical applications of cryptography (TLS, VPN, secure email).
    • Good data protection practices.
    • Practical exercises with encryption tools.

    Operating Systems and Environment Security

    • Security in Linux and Windows systems.
    • Essential commands and permission settings.
    • Introduction to PowerShell and Bash for secure administration.
    • Fundamentals of social engineering and prevention.
    • Hardening and access control practices.
    CISCO CYBEROPS ASSOCIATE

    Fundamentals and Context of Cybersecurity

    • Cybersecurity principles and threat landscape.
    • Actors, advocates, and roles in a SOC.
    • Basic concepts of Windows and Linux operating systems.
    • Using the command line and analyzing logs.
    • Introduction to the work of a security analyst.

    Networks, Protocols and Infrastructure

    • Fundamentals of TCP/IP networking and architecture.
    • Network protocols and services (DNS, HTTP, DHCP, etc.).
    • Network devices: switches, routers, firewalls.
    • Security infrastructure: segmentation and secure zones.
    • Connectivity and traffic flow monitoring.

    Threats, Attacks and Monitoring

    • Types of attackers and common techniques.
    • Common threats: malware, phishing, DoS, exploits.
    • Detection and monitoring with IDS, IPS and SIEM.
    • Network traffic and behavior analysis.
    • Incident mitigation strategies.

    Defense, Cryptography and Asset Protection

    • Access control and authentication.
    • Threat Intelligence.
    • Applied cryptography: encryption, signatures and PKI.
    • Endpoint protection and vulnerability management.
    • Secure protocols: VPN, TLS, IDS/IPS.

    Security Data, Alerts and Incidents

    • Security data analysis: logs and events.
    • Evaluation and classification of alerts in SOC.
    • Correlation and normalization of data.
    • Incident cycle management.
    • Incident response and forensic analysis.
    FINAL PROJECT
    • Course Review

    • Case study
    OFFICIAL CERTIFICATION SEMINAR
    • Preparation of exam-type questions

      Demo Video
      Infórmate Infórmate

      Subsidized Training for Companies

      Cloud Training as an entity registered with code 16753 in the State Registry of Training Entities, Manages and teaches courses within the Company-Programmed Training initiative, Vocational Training for Employment, in accordance with the provisions of Law 30/2015, of September 9.

      Cloud Training helps you check your company's credit amount for this year, free of charge.