📞 +1 (515) 309-7846✉️ info@zarantech.comLogin | Sign Up

Cybersecurity Analyst Program

Launch a career in defensive security. Master SOC operations, SIEM tools, threat detection, and incident response with hands-on labs.

Course Overview

This program prepares you for SOC Analyst Tier 1/2 roles. You'll work in simulated security environments, investigate real attack patterns, and learn the tools used in modern security operations centers.

What You'll Learn

  • Security fundamentals: CIA triad, threat models, frameworks
  • Networking and protocol analysis
  • SIEM platforms: Splunk, ELK, Microsoft Sentinel
  • Endpoint detection and response (EDR)
  • Threat hunting and MITRE ATT&CK mapping
  • Incident response and digital forensics basics
  • Vulnerability assessment with Nessus and OpenVAS

Curriculum

Module 1 · Security Foundations (6 hrs)
  • Security principles and risk
  • Common attack patterns
Module 2 · Networking for Security (8 hrs)
  • TCP/IP, DNS, HTTP analysis
  • Wireshark and packet captures
Module 3 · SIEM & Log Analysis (10 hrs)
  • Splunk SPL queries
  • Detection rule writing
Module 4 · Threat Detection (8 hrs)
  • MITRE ATT&CK framework
  • Threat hunting workflows
Module 5 · Incident Response (8 hrs)
  • IR lifecycle and playbooks
  • Forensic triage
Module 6 · Vulnerability Management (5 hrs)
  • Scanning and prioritization
  • Patch management workflows
Module 7 · Capstone Lab (5 hrs)
  • End-to-end SOC simulation
  • Incident write-up and report

Upcoming Batches

Weekend BatchSat & Sun · 10:30 AM – 1:00 PM CST
Enroll
Weekday BatchMon–Fri · 7:30 – 9:30 PM CST
Enroll

FAQ

What background do I need?
Basic IT or networking knowledge is helpful. We refresh networking fundamentals early.
Will I get hands-on lab access?
Yes — cloud-based labs with simulated attacks and real SIEM tools.
Does this align to certifications?
Content overlaps with CompTIA Security+ and SOC Analyst tier-1 expectations.