SCSA v1 – siem certified soc analyst

SCSA v1 - Siem Certified Soc Analyst

#job-oriented soc analyst program

This job-oriented soc analyst program was specially designed from industrial soc experts team to get jobs as a soc analyst L1 & soc analyst L2. focusing on major siem tools like Splunk enterprise, IBM Qradar, Alien vault, Cortex XSOAR and cortex XDR. and architectures like inhouse, hybrid and MSSP also. This 4 month program includes certification and dedicated job support as well. 


65+ already registered

60+ already successfully placed in MNC’s

This SCSA job-oriented program especially designed with enterprise siem solutions and soc architectures (inhouse, hybrid, and MSSP). we are explain enterprise siem tools like Splunk Enterprise, Qradar, Alien vault, XSOAR and XDR.  SiemHunters in partnership with most reputed companies and we have our dedicated job portal to connect 100+ organizations. it helps to learn enterprised level Siem tools and SOC technologies used to monitor, analyze, and investigate the security incidents in organizations. This program mostly focuses on defend the security breaches and monitor security incidents in 24/7. Our certified instructors delivery enterprise level real-time incidents using siem tools and aws labs. 

Enterprised Siem tools: Splunk Enterprise, Qradar, Alien Vault, XSOAR 

Program Overview

Become an Experience SOC Analyst..!

Start to Success

#enterprise scenario based SIEM training

SiemHunters is a unit of Cyberloop & Pentesterzone. We are provide enterprise based training and lab scenarios, We have 10+ industrial certified instructor team to delivery Ec Council courses and certifications.

Certified SOC Analyst SCSA v1 will teach you the latest SIEM Tools and architecture-based Techniques and methods followed by the enterprises. we are delivering courses as per the organization scenarios and their standards and create our own enterprise lab scenarios also. 

Key Features of SCSA v1

120+ Hours of Instructor Led Training

Flexible timings

40+ Enterprise Labs

Exam Voucher Included

Dedicated Job portal

Self-Learning Access

Learning Path

lesson 1 – Security Management
lesson 2 – Capabilities of SOC
lesson 3 – Typical functions of Soc Operations
lesson 4 – SOC Workflow
lesson 5 – Components of SOC
lesson 6 – Types of SOC Models
lesson 7 – SOC Vs NOC
lesson 8 – Security Operations
lesson 9 – Need of SOC

Learn: security management,capabilities of soc,functions of soc operations,soc workflow,components of soc and soc models,SOC vs NOC,security operations,need of SOC

Lesson – 1 Cyber Threats
lesson 2 – Intent-Motive-Goal
lesson 3 – Tactics-Technqiues-Procedures
lesson 4 – Opportunity-Vulnerability-Weakness
Lesson 5 – Network,Host,Application Level Attacks
Network,Host,Application Level Attacks – 2
Network,Host,Application Level Attacks – 3
Network,Host,Application Level Attacks – 4
Network,Host,Application Level Attacks – 5
lesson 6 – Cyber Threat IoCs
lesson 7 – Hacking Methodologies

Learn: cyber threats,intent-motive-goal,tactics-techniques-procedures,vulnerability weakness,network,host,application level attacks,cyber threat IOCs,hacking methodologies

lesson 1 – Log , Event and Incident
lesson 1 – Centralized Logging challenges – 1
lesson 1 – Centralized Logging challenges – 2
lesson 2 – Typical Log Sources
lesson 3 – Need of Log
lesson 4 – Logging Requirements
lesson 5 – Typical Log Format
lesson 6 – Local Logging – 1
lesson 6 – Local Logging – 2
lesson 6 – Local Logging – 3
lesson 6 – Local Logging – 4
lesson 6 – Local Logging – 5

Learn: log event and incident,centralized logging challenges,typical log sources,need of log,logging requirements,typical log format,local logging

Lesson 1 – Security Infromation and Event Management (SIEM)
lesson 2 – Need of SIEM
lesson 3 – Typical SIEM Capabilities
lesson 4 – SIEM Architecture and its Components
lesson 5 – SIEM Solutions
lesson 6 – SIEM Deployment – 1
lesson 6 – SIEM Deployment – 2
lesson 7 – Incident Detection with SIEM and Use Case Examples For Application Level Incident Detection
lesson 8 – Use Case Examples For Insider Incident Detection
lesson 9 – Use Case Examples For Network Level Incident Detection – 1
lesson 9 – Use Case Examples For Network Level Incident Detection – 2
lesson 10 – Use Case Examples For Host Level Incident Detection
lesson 11 – Handling Alert Triaging and Analysis

Learn: security information and event management(SIEM),need of siem,siem capabilities,architecture and its components,siem solutions,siem deployment,Incident, Detection with SIEM and Use Case Examples For Application Level Incident Detection,use case examples for insider incident detection,network level incident detection,host level incident detection,handling alert triaging and analysis

lesson 1 – Cyber Threat Intelligence (CTI)
lesson 2 – Types of Threat Intelligence – 1
lesson 2 – Types of Threat Intelligence – 2
lesson 3 – Threat Intelligence-driven SOC
lesson 4 – Benefit of Threat Intelligence to SOC Analyst
lesson 5 – Threat Intelligence Use Cases for SOC Analyst
lesson 6 – Integration of Threat Intelligence into SIEM
lesson 7 – Threat Intelligence Use Cases for Enhanced Incident Response
lesson 8 – Enhancing Incident Response by Establishing SOPs for Threat Intelligence

Learn: cyber threat intelligence(CTI),types of threat intelligence,threat intelligence driven SOC,benefit of threat intelligence to soc analyst,threat intelligence use cases for SOC analyst,integration of threat intelligence into SIEM,threat intelligence use cases for enhanced incident response,enhanced incident response by establishing SOPs for threat intelligence

lesson 1 – Incident response
lesson 2 – SOC and IRT Collaboration
lesson 3 – Incident Response (IR) Process Overview – 1
lesson 3 – Incident Response (IR) Process Overview – 2
lesson 3 – Incident Response (IR) Process Overview – 3
lesson 3 – Incident Response (IR) Process Overview – 4
lesson 3 – Incident Response (IR) Process Overview – 5
lesson 4 – Responding to Network Security Incidents
lesson 5 – Responding to Application Security Incidents
lesson 6 – Responding to Email Security Incidents
lesson 7 – Responding to an Insider Incidents
lesson 8 – Responding to an Malware Incidents

Learn: incident response, SOc anf IRT collaboration,IR process over view,responding to network security ,application security,and email security incidents,responding to an insider and malware incidents

Tools Covered

20+ Enterprised tools & cloud based tools

Certified Ethical Hacker Details

Target Audience

CEH Certification does not require any prerequisite

Ethical hackers
Information Security Analyst
Fresher graduates
Security Analyst

CEH v11 - Ec Council

21 lessons - 45+ hours
View Course

Exam Information

For EC-Council Certified Ethical Hacker (CEH) certification

Certification Name:  312-50 (ECC EXAM), 312-50 (VUE)
Test Format: Multiple Choice
Number of Questions: 125
Test Duration: 4 Hours

CEH v11 - Ec COuncil

21 lessons - 45+ hours
View Course

Learning Options

Classroom training


Certification & Training

Self-Learning Access


Certification & Self Learning

Enterprise Training


Certification & Training

New era of Job searching..!

We have our own dedicated job site only for cyber security & SOC connected to the large no of cyber security industries and help cyber folks to get their dream jobs in cyber security field. 

This application already connected to more than 100+ cyber security companies and our dedicated team post jobs & remind you.

FAQ's about CSA

what type of training modes available in SiemHunters..?

SiemHunters is a Unit of cyberloop & Pentesterzone offers Instructor-Led training, Live Classroom, On-demand and Self paced. most of the attendees choose live classroom training and on-demand.

Where can i take ec council exams?

SiemHunters offers ec council training and certifications in Hyderabad and Vijayawada. currently, you can attend exams in-house under our proctor vision. 

How do i become a CSA - certified SOC Professional..?

To become a certified ethical hacker, you’ll want to follow these steps:

1. register at siemhunters Training center

2. choose your mode of training

3. Complete your training and doing all exercises with our own enterprise labs

4. Attend the exam in our center (ECC)

5. once you pass in exam, you will become a certified SOC Analyst

After CSA, what type of roles i expected?

After earn your CSA certifications. you are officially certified Professional and also called as a security analyst. this below are the roles after CSA in global IT.

SOC Analyst L1 & L2

Cyber Security Analyst

Forensics Investigator

Incident Response

Malware Analyst

How SiemConnect works..?

SiemConnect already working with 100+ cyber security organizations, it helps to apply internships, cyber security jobs, and siem jobs also

how are our instructors?

All of our Highly qualified trainers are CEI certified with 10 + years of experience in global corporates in the areas of Security domain.

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
  • Attributes
  • Custom attributes
  • Custom fields
Click outside to hide the compare bar
Connect with our expert
Need help.? Contact our
Scan the code
Hi Welcome to SiemHunters learning platform