CLOUD//RANGES

// COMBOSBLUE TEAM SECURITY

// BLUE TEAM SECURITY

SOC Analyst Level 1 Labs

4 LABS4h 30m TOTAL180-DAY ACCESS

// PROGRAM OVERVIEW

Entry-to-intermediate SOC training covering log triage, phishing investigation, SIEM rules, alert tuning, evidence collection, and incident handling.

MC

// LEAD INSTRUCTOR

Michael Carter

Michael Carter teaches practical blue-team workflows from years of cloud incident response, detection engineering, and security operations leadership.

// 4 LABS INCLUDED

01

SOC Analyst Log Triage Fundamentals

beginner55m

Analyze authentication, endpoint, DNS, and web logs to separate normal activity from suspicious behavior. Students practice alert notes and escalation criteria.

02

Phishing Investigation and Email Security

beginner60m

Investigate a phishing case using email headers, URLs, attachments, and user reports. Students classify the threat and recommend containment actions.

03

SIEM Detection Rules and Alert Tuning

intermediate75m

Write detection rules, tune false positives, map alerts to MITRE ATT&CK, and build a simple dashboard. Students learn practical SOC engineering habits.

04

Incident Handling Tabletop and Evidence Collection

intermediate80m

Walk through a practical incident workflow: scope, contain, preserve evidence, communicate status, and close with lessons learned.

// GET ACCESS

$119one-time

Group pricing: $179

Labs included4 hands-on labs
Access duration180 days
EnvironmentsLive cloud (Azure/GCP)
Provision time~47 seconds
CertificateUpon completion

No registration required to purchase