SlideShare a Scribd company logo
1 of 8
Certified IT Infrastructure and
Cyber SOC Analyst (CICSA)
A Comprehensive Training Program on Cyber Security Operations
Introducing CICSA
As enterprises around the globe were facing huge skill crises in the
domains like Information Security, Cyber Security Operations, and
Infrastructure Management, RTHA introduced CICSA which helps
candidates to build a career in Cyber Security, Infrastructure
Management, Cyber Forensics, and Cyber Operations.
2
What will you learn?
▰ CYBER SECURITY BUILDING BLOCK
▰ INFRASTRUCTURE AND NETWORKING
▰ LINUX ESSENTIALS
▰ OFFENSIVE SECURITY
▰ WEB APPLICATION SECURITY
▰ NETWORK SECURITY
▰ SECURITY MANAGEMENT AND OPERATION
▰ SECURITY INFORMATION & EVENT MANAGEMENT
▰ SPLUNK
▰ INCIDENT RESPONSE
3
Who is this course for?
▰ Graduates
▰ Under Graduates
▰ Network and Systems Administrators
▰ IT Staff or anyone interested in learning
information security
4
Why CICSA?
▰ All-inclusive security defense and protection understanding
▰ Fully-equipped real-like practice environments
▰ Most recent and proven methodologies for defensive security
evaluation
▰ Career-focused curriculum designed by industry experts
▰ Highly valued security credentials after training completion
▰ Training sessions delivered by Subject Matter Experts having
extensive experience
▰ Internationally Certified Instructors
▰ Industry Accredited Program
▰ Exclusive Soft Skill Training
5
Career Opportunities
▰ Cybersecurity Engineer
▰ Application Penetration Tester
▰ Information Security Consultant
▰ Security Operations Center Engineer
▰ Cybersecurity Engineer
▰ Risk Advisory Consultant
▰ Network Security Engineer
6
Why RedTeam Hacker Academy?
▰ Highly equipped Labs
▰ Industry Leading Curriculum
▰ 100 % Practical Hands-on Experience
▰ Certified and Experienced Trainers
▰ Futuristic Infrastructure
▰ 100% Placement Assistance
7
“
HACK OUT YOUR CAREER
8

More Related Content

What's hot

5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
isc2-hellenic
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
Bryan Len
 

What's hot (20)

Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Complete Cyber Security Course
Complete Cyber Security CourseComplete Cyber Security Course
Complete Cyber Security Course
 
Skills For Career In Security
Skills For Career In SecuritySkills For Career In Security
Skills For Career In Security
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 

Similar to SOC Analyst Course

Similar to SOC Analyst Course (20)

Soc analyst course
Soc analyst courseSoc analyst course
Soc analyst course
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Datasheet
DatasheetDatasheet
Datasheet
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
CISSP with Net Security Training
CISSP with Net Security Training CISSP with Net Security Training
CISSP with Net Security Training
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
What type of training is required for cyber security.pdf
What type of training is required for cyber security.pdfWhat type of training is required for cyber security.pdf
What type of training is required for cyber security.pdf
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

SOC Analyst Course

  • 1. Certified IT Infrastructure and Cyber SOC Analyst (CICSA) A Comprehensive Training Program on Cyber Security Operations
  • 2. Introducing CICSA As enterprises around the globe were facing huge skill crises in the domains like Information Security, Cyber Security Operations, and Infrastructure Management, RTHA introduced CICSA which helps candidates to build a career in Cyber Security, Infrastructure Management, Cyber Forensics, and Cyber Operations. 2
  • 3. What will you learn? ▰ CYBER SECURITY BUILDING BLOCK ▰ INFRASTRUCTURE AND NETWORKING ▰ LINUX ESSENTIALS ▰ OFFENSIVE SECURITY ▰ WEB APPLICATION SECURITY ▰ NETWORK SECURITY ▰ SECURITY MANAGEMENT AND OPERATION ▰ SECURITY INFORMATION & EVENT MANAGEMENT ▰ SPLUNK ▰ INCIDENT RESPONSE 3
  • 4. Who is this course for? ▰ Graduates ▰ Under Graduates ▰ Network and Systems Administrators ▰ IT Staff or anyone interested in learning information security 4
  • 5. Why CICSA? ▰ All-inclusive security defense and protection understanding ▰ Fully-equipped real-like practice environments ▰ Most recent and proven methodologies for defensive security evaluation ▰ Career-focused curriculum designed by industry experts ▰ Highly valued security credentials after training completion ▰ Training sessions delivered by Subject Matter Experts having extensive experience ▰ Internationally Certified Instructors ▰ Industry Accredited Program ▰ Exclusive Soft Skill Training 5
  • 6. Career Opportunities ▰ Cybersecurity Engineer ▰ Application Penetration Tester ▰ Information Security Consultant ▰ Security Operations Center Engineer ▰ Cybersecurity Engineer ▰ Risk Advisory Consultant ▰ Network Security Engineer 6
  • 7. Why RedTeam Hacker Academy? ▰ Highly equipped Labs ▰ Industry Leading Curriculum ▰ 100 % Practical Hands-on Experience ▰ Certified and Experienced Trainers ▰ Futuristic Infrastructure ▰ 100% Placement Assistance 7
  • 8. “ HACK OUT YOUR CAREER 8