Course

Credit Type:
Course
ACE ID:
IRON-0003
Version:
1
Organization's ID:
BLUE 2
Organization:
Location:
Online
Length:
11 weeks (100 hours)
Minimum Passing Score:
70
ACE Credit Recommendation Period:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Upper-Division Baccalaureate 3 Incident Handling
Competency Framework Statement
NICE Workforce Framework for Cybersecurity Analyze network traffic anomalies (T1386)
NICE Workforce Framework for Cybersecurity Collect and maintain system cybersecurity report data (T1086)
NICE Workforce Framework for Cybersecurity Configure network hubs, routers, and switches (T1100)
NICE Workforce Framework for Cybersecurity Detect cybersecurity attacks and intrusions (T1347)
NICE Workforce Framework for Cybersecurity Develop vulnerability remediation plans (T1356)
NICE Workforce Framework for Cybersecurity Monitor cybersecurity data sources (T1233)
NICE Workforce Framework for Cybersecurity Perform continuous monitoring of system activity (T1350)
NICE Workforce Framework for Cybersecurity Recommend threat and vulnerability risk mitigation strategies (T1603)
NICE Workforce Framework for Cybersecurity Review cyber defense service provider reporting structure (T1021)
NICE Workforce Framework for Cybersecurity Skill in conducting vulnerability scans (S0024)
NICE Workforce Framework for Cybersecurity Skill in configuring network protection components (S0618)
NICE Workforce Framework for Cybersecurity Skill in deploying continuous monitoring technologies (S0451)
NICE Workforce Framework for Cybersecurity Skill in identifying anomalous activities (S0838)
NICE Workforce Framework for Cybersecurity Skill in implementing established network security practices (S0583)
NICE Workforce Framework for Cybersecurity Skill in manipulating operating system components (S0606)
NICE Workforce Framework for Cybersecurity Skill in performing data analysis (S0854)
NICE Workforce Framework for Cybersecurity Skill in performing log file analysis (S0866)
NICE Workforce Framework for Cybersecurity Skill in performing network traffic analysis (S0874)
NICE Workforce Framework for Cybersecurity Skill in performing network traffic packet analysis (S0875)
NICE Workforce Framework for Cybersecurity Skill in reviewing logs (S0641)
NICE Workforce Framework for Cybersecurity Update system security measures (T1520)
Description

Objective:

The course objective is to prepare learners for technical beginner roles in Security Operations Centers (SOCs), such as Tier 1 SOC Analyst or Security Operations Technician. Through a hands-on, scenario-based curriculum, learners gain foundational skills in log analysis, threat detection, alert triage, and incident escalation.

Learning Outcomes:

  • Implement Sigma rules in Splunk by converting them into SPL, configuring real-time alerts, and validating detections through attack simulation
  • Analyze a real-world breach report for a CVE to extract actionable threat intelligence
  • Validate exposure in your environment using command-line tools and apply remediation techniques for identified indicators of compromise
  • Analyze captured network traffic in Wireshark to uncover device activity and identify search, media, and system details
  • Analyze packet captures in Wireshark to identify scanning techniques and uncover targeted systems during a network intrusion
  • Extract and analyze files transmitted over a network using Wireshark and NetworkMiner to validate file structures and identify artifacts
  • Implement SNMPv2 on a Cisco router in Packet Tracer to manage and verify device settings
  • Analyze network traffic with Zeek and zeek-cut to extract data from logs and interpret traffic patterns
  • Configure Nagios XI with SNMP to monitor Windows Server services, processes, and operational status
  • Deploy Zabbix agents on Windows systems to configure and tune security monitoring alerts for detecting anomalous behavior
  • Configure Suricata on a pfSense firewall to apply custom IDS rules and analyze alerts from network traffic
  • Configure NAT port forwarding and custom Suricata rules in pfSense to detect non-standard FTP activity and verify alerts
  • Write and test custom Suricata detection rules against PCAP files and live traffic to validate accurate detection of port scanning activity
  • Refine a SIEM correlation rule in Splunk to reduce false positives and prioritize attacker alerts using Windows security logs
  • Analyze SIEM alerts, LDAP traffic, and PowerShell scripts to determine attack methodologies
  • Identify compromised user accounts and domain components during a simulated domain breach
  • Detect and investigate security events in Splunk by analyzing failed login attempts, suspicious file downloads, and event data to identify attack patterns
  • Analyze SQL injection attacks using SIEM dashboards and Splunk to identify attack types and attacker IPs
  • Investigate SQL payloads and detection gaps to understand attacker methods and false negatives
  • Analyze command injection attacks in Splunk by investigating alerts, attacker IPs, redirect destinations, and attack patterns in log data
  • Implement a VirusTotal threat intelligence playbook in Splunk SOAR to automate analysis of suspicious files and URLs
  • Analyze recovered Windows event logs in Splunk to reconstruct an attack timeline
  • Correlate logon events, process executions, and service installations to validate timeline conclusions on a compromised Windows machine
  • Create forensic images of a logical drive in E01 and RAW formats with FTK Imager to validate integrity and preserve digital evidence
  • Analyze a memory dump with Volatility to identify hidden processes and enumerate running tasks
  • Extract URLs from memory and assess them with VirusTotal to evaluate malicious behavior
  • Analyze a Windows memory dump with Volatility to identify suspicious processes, loaded DLLs, and network connections
  • Detect code injection and validate findings with VirusTotal
  • Capture and analyze system memory with FTK Imager and forensic tools to search for artifacts, validate integrity, and compare acquisitions
  • Analyze a forensic disk image with Autopsy to identify digital artifacts, trace user activity, and document evidence of a system breach
  • Analyze an email and HTML attachment using static and dynamic techniques to identify payloads, execution behavior, and persistence mechanisms
  • Correlate identified indicators of compromise with MITRE ATT&CK techniques
  • Evaluate the roles of AI agents in security operations, including threat hunting, incident response, threat intelligence analysis, and compliance monitoring
  • Explain how continuous operation, scalability, and adaptability enhance the effectiveness of AI-driven security functions

General Topics:

  • SOC Operations and Threat Monitoring: Security Operations Concepts, Network Security Monitoring, Intrusion Detection and Prevention Strategies
  • Threat Detection and Log Analysis: SIEM Tuning and Alert Operations, Introduction to SOAR, Advanced Windows and Linux Log Analysis
  • Incident Response and Vulnerability Management: Digital Evidence Acquisition, Incident Response Purple Teaming and AI-Driven Defense
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Computer Based Training
  • Practical Exercises
  • Work-based Learning
  • Performance Rubrics (Checklists)
  • Facilitation Weekly - Optional

Methods of Assessment:

  • Case Studies
  • Performance Rubrics (Checklists)
  • Presentations
  • Quizzes
Supplemental Materials
Equivalencies