Back to catalog
SecurityAdvanced

Blue Team and SOC Analyst

Train for the defensive side of security. This course walks through detection, SIEM workflows, threat hunting, incident response, foundational forensics, and how a modern SOC operates using real tools and playbooks.

14 lessonsCertificate includedUSD 10 (~ARS 10.000)

Course syllabus

1

Blue Team foundations

3 lessons
  • SOC role: functions, tiers, and tooling
  • Threat intelligence: sources and practical use
  • Defensive frameworks: MITRE ATT&CK and D3FEND
2

SIEM and detection

4 lessons
  • Elastic Stack: ingestion, indexing, and search
  • Splunk: SPL queries and security dashboards
  • Detection rules: correlation rules and alerts
  • Reducing false positives
3

Incident response

3 lessons
  • IR lifecycle: preparation, detection, containment
  • Foundational forensics: memory and disk
  • Playbooks and runbooks for common incidents
4

Threat hunting

3 lessons
  • Proactive hunting methodology
  • Hunting with KQL and SPL
  • Indicators of compromise (IOCs) and TTPs
5

Final project

1 lessons
  • Full investigation of a simulated incident

What you will learn

Blue teamSOC operationsSplunk / ElasticThreat huntingIncident responseFoundational forensics

Certificate

SOC Analyst Certificate - CumbreAcademy

Ready to start?

Investment: USD 10 (~ARS 10.000)

Buy access

Want access to every course?

Total Access gives you this course and all the others for $20/month.

This course: USD 10 (~ARS 10.000) - Total Access: $20 USD/month (all courses)
See Total Access

Enroll

USD 10 (~ARS 10.000)
Buy access