We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

SOC Analyst

Can You Outsource Your Cybersecurity Operations?

Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance

Price
Course duration Duration: 30 minutes

Accredited DevOps Foundation

Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.

Contact us
Course duration Duration: 7 hours, 37 min.

Accredited DevOps Professional

Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.

Contact us
Course duration Duration: 13 hours, 10 min.

Implement Enterprise Splunk for Your Business

Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.

Contact us
Course duration Duration: 2 hours

Getting Your Data Into Splunk Effortlessly

Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.

Contact us
Course duration Duration: 2 hours

Amping Up Splunk with Advanced Admin

Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.

Contact us
Course duration Duration: 1 hour, 39 min.

Splunk Enterprise Administration Fundamentals

Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.

Contact us
Course duration Duration: 5 hours, 31 min.

Palo Alto Networks Cybersecurity Fundamentals (PCCSA)

Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.

Contact us
Course duration Duration: 6 hours, 47 min.

Linux Shell Scripting - Advanced

In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.

Contact us
Course duration Duration: 8 hours, 15 min.

Becoming a Linux Power User

Becoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.

Contact us
Course duration Duration: 8 hours, 45 min.

Linux Security Techniques

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.

Contact us
Course duration Duration: 11 hours

CertNexus CyberSec First Responder (CFR-310)

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.

Contact us
Course duration Duration: 13 hours, 20 min.

Intro to AV/EDR Evasion

Embark on your journey into the dynamic world of cybersecurity with our introductory course tailored for aspiring red team members or advanced penetration testers. Designed for those new to the realm of Antivirus (AV) and Endpoint Detection and Response (EDR) evasions.

Contact us
Course duration Duration: 5 hours

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Contact us
Course duration Duration: 21 hours, 20 min.

Automating Incident Response Challenges in Your SOC

Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.

Price
Course duration Duration: 30 minutes

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Price
Course duration Duration: 15 minutes

AI-Powered SOC and Threat Intelligence

Learn about cutting edge trends in AI-Powered SOCs today!

Price
Course duration Duration: 45 minutes

Vulnerable Erlang

Master container security in our Vulnerable Erlang course! Exploit CVE-2025-32433, deploy vulnerable Docker containers, detect threats with Sysdig Falco, and secure systems. Ideal for security professionals, DevSecOps, and pentesters.

Contact us
Course duration Duration: 1 hour, 30 min.

Linux Fundamentals for Certification

The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.

Contact us
Course duration Duration: 74 hours, 15 min.
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement