SOC Analyst in Ahmedabad Gujarat
"Upon completing the Cybersecurity Program at IONX Ahmedabad, Students can pursue various entry-level positions,
including Security Analyst, SOC Analyst, Penetration Tester, and Cloud Security Specialist and more..."
IONX is transforming Ahmedabad into a thriving hub for cybersecurity professionals. As cyber threats grow more sophisticated, the demand
for skilled Security Operations Center (SOC) analysts has never been higher. IONX is at the forefront of this change, offering a dynamic program
that equips individuals with the practical skills needed to succeed in today’s cybersecurity landscape.Our program offers hands-on training in
critical areas such as Network Security Operations, Endpoint Security, Threat Analysis & Hunting, Incident Response, and Vulnerability Management,
ensuring that students are prepared to tackle real-world challenges. Through our partnership with industry leaders,
IONX provides access to the latest tools and technologies, empowering students to build expertise in Cloud Security, Penetration Testing, and Governance, Risk, and Compliance.
With a focus on practical experience and job readiness, IONX prepares the next generation of cybersecurity talent to secure networks, endpoints, and data, making
Ahmedabad a prime destination for cybersecurity innovation. Join IONX, where we are creating a new wave of cybersecurity professionals ready to defend against the evolving
threats of the digital world.
Enroll for SOC Trainings Free Demo Class
Request Demo Class
₹35,999/- | $600/- Duration: 170 Days
[Note: Prices can be Discounted on Center Trainings]
Cyber Security Architecture & landscape
Network Security & Cloud Security Operations
Endpoint Security & Attacks
Blue Teaming and Red Teaming Activities
Digital Forensics & Incident Response
Vulnerabilities Management
Penetration Testing
Threat Analysis & Hunting
Governance, Risk, and Compliance
Detailed Syllabus of SOC Analyst Trainings
Fundamentals of Hardware Systems
Fundamentals of Operating Systems
Virtualization and Installation of Operating Systems
Working wtih Network Architecture
Working wtih Cloud Computing
Working wtih Web Architecture
Cyber Security Architecture Models
Basic of Endpoint Security (Anti-virus,Anti-malware & Mail Security )
LAN, WAN, MAN, and CAN Architecture
Layer 2 switching (VLAN, DTP, VTP, STP, Etherchannel)
Layer 3 Routing (RIP, OSPF, NAT, PAT)
IPv6|IPv4 (Subnetting, Routing)
Access Management (AAA {RADIUS|TACACS}, ACL {Extended & Standard})
Layer 2 Security (DAI, DHCP Spoofing, Port Security)
Wireless Network (Access Point, WEP, WPA, WPA2, WPA3)
Firewall Configurations and Workings
ZTNA - Zero Trust Network Acess
IAM - Identity Access Management
IAAS PAAS SAAS Working and Security
Working with AWS for Deployment & Operations
Cisco Virtualization (SDN)
Cisco Automation (API, SD WAN, SD Access)
Windows Endpoint Security & Threat Detection in SOC
Common Windows Attacks and SOC Mitigation Strategies
Real-Time Threat Monitoring for Windows Environment in SOC
Securing Linux Ubuntu Endpoints in SOC
Incident Response for Linux Endpoints in SOC
SOC Tools for Endpoint Security: Windows vs Linux
- Red Teaming with Reconnaissance and Information Gathering
- Red Teaming with Network Scanning and Enumeration
- Blue Teaming with Network Defense
- Blue Teaming with Intrusion Detection Systems (IDS)
- Blue Teaming with Log Management and Analysis
- Red Teaming with Exploitation and Vulnerability Assessment
- Blue Teaming with Endpoint Protection and Anti-Malware
- Blue Teaming with Incident Response and Handling
- Blue Teaming with Phishing and Social Engineering
- Red Teaming with Privilege Escalation
- Red Teaming with Post-Exploitation Techniques
- Red vs Blue Security Information and Event Management (SIEM)
Introduction to Malware Analysis
Static vs Dynamic Malware Analysis
Dynamic Malware Behavior
Dynamic Malware Behavior with Scanning & Sandboxing
Dynamic Malware Behavior with Security Services
Malware Chain: Advanced Persistent Threat
Forensics and Log Analysis for Network Security
Forensics and Log Analysis for Web Security
Authentications Attacks on Systems
Network,Web,API Scanning & VA-PT
Web Security Fundamentals
OWASP Top 10 Vulnerabilities
Web Application Penetration Testing
Network & Web Scannings for Firewalls
Introduction to SOC Operations
The SOC Landscape
Threat Intelligence
Reconnaissance & Network Scanning
Security Attacks on Systems
Authentications Attacks on Systems
Understanding of Lateral Movement
Understanding of Unauthorized Access
Threat Hunting from Mal-Code
Threat Hunting from Dark Web Activities
Threat Hunting with Intelligence
Data Governance and Privacy
Internal Controls and Auditing
Incident Management and Response
Conduct Threat Analysis & Reporting
Conduct Vulnerability Analysis & Report for Auditing
Conduct Malware Analysis for IOC and Mal-Families
Cyber Threat Graphing
Dataflow and InfaFlow Graphing
Introduction to GRC
Risk Management Fundamentals
Information Security Governance
Data Governance and Privacy
Internal Controls and Auditing
Incident Management and Response