Current Status
Not Enrolled
Enroll in this course to get access
Price
Closed
Get Started
SOC Analyst Core: Enterprise Security Track
Formerly 101 Enterprise Security Fundamentals
> View Course Syllabus
Support & FAQs
Please use our Support & FAQ page to find more information and reach out to us and join our Discord community for general conversation topics and networking.
Important: Virtual Labs
- Your labs are real virtual machines in the cloud. This means it may take a few minutes until they are started up and available.
- Whenever you have less than 15 minutes remaining, you will have the option to extend your lab by 1 hour.
- When a VM shuts down, it will not store your files and data.
- For the best experience, it’s recommended to use Google Chrome where you will have copy and paste functionality.
Tools Used
Sysmon, PowerShell, CyberChef, ExifTool, Sysinternals Tools, AdFind, PowerView, Incognito, John Ripper, Mimikatz, RClone, Process Hacker, scdbg, Cmder, dnSpy, capa, oletools, Wireshark, PEStudio
Certificate of Completion
Once you finish the course you will receive your Certificate of Completion!
Average Review Score:
★★★★★
You must log in and have started this course to submit a review.
Course Content
Introduction
Lesson Content
0% Complete
0/2 Steps
Offline Lab Setup
1 Topic
You don't currently have access to this content
Lesson Content
0% Complete
0/1 Steps
1) Enterprise Domain Environments
1.1 Enterprise Domain Environments
6 Topics
You don't currently have access to this content
1.2.1 Windows Event Logs
3 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/3 Steps
1.2.2 PowerShell Event Logging and Tuning
5 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/5 Steps
1.2.3 Sysmon Event Logging and Detection
6 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/6 Steps
2) Initial Access
Initial Access Techniques
5 Topics
You don't currently have access to this content
3) LOLBins
Discovery, Execution and File Transfer with LOLBins
6 Topics
You don't currently have access to this content
4) Discovery
Domain Reconnaissance
5 Topics
You don't currently have access to this content
5) Credential Attacks
Credential Dumping
5 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/5 Steps
Sessions and Tokens
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
6) Lateral Movement
Lateral Movement Techniques
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
7) Windows Endpoint Compromise
Windows Endpoint Compromise Overview
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
Persistence Mechanisms
3 Topics
You don't currently have access to this content
Privilege Escalation Techniques
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
Execution and Defense Evasion
4 Topics
You don't currently have access to this content
Data Staging and Exfiltration Techniques
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
8) Network Telemetry
Network Telemetry and Security
2 Topics
You don't currently have access to this content
Windows Network Security
2 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/2 Steps
C2 Beacon Analysis
3 Topics
You don't currently have access to this content
9) Malware
Static Malware Analysis
7 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/7 Steps
Dynamic Malware Analysis
1 Topic
You don't currently have access to this content
PowerShell Payload Analysis
3 Topics
You don't currently have access to this content
Lesson Content
0% Complete
0/3 Steps
Final
Congratulations and Next Steps
You don't currently have access to this content



Enjoyed the class. It was a refresher course in some areas and I also learned some newer technologies and tools.