Professional Certification in Cybersecurity: Essentials, Analyst with AI
About Course
This job-ready program takes you from absolute fundamentals to an entry-level Security Operations Center (SOC) Analyst who can also leverage AI for faster detection, triage, and response. Youβll learn networking and OS basics, threat landscape, log analysis, SIEM/EDR/SOAR tooling, the MITRE ATT&CK framework, playbook-driven incident response, and how to use AI (LLMs and automation) to boost analyst productivityβdrafting queries, summarizing alerts, writing detections, and generating reports.
Youβll practice on realistic datasets, hands-on labs, blue-team scenarios, and a capstone project that simulates a complete incident from alert β investigation β containment β recovery β reporting. The syllabus references common enterprise tools (Splunk/Microsoft Sentinel/ELK, CrowdStrike/Microsoft Defender, TheHive/Wazuh-like stacks) and emphasizes Indian business contexts (cost-effective open-source options, privacy & governance basics).
Deliverables youβll create:
-
Personal homelab (Windows + Linux) with safe sample logs
-
Detection rules & SIEM queries (KQL/SPL/Lucene)
-
IR playbooks and runbooks (PDF + markdown)
-
Executive incident report (non-technical) + technical post-incident report
-
AI prompts library for SOC (triage, summarization, detection drafting)
-
Capstone walkthrough and evidence pack
Prerequisites (recommended, not mandatory): Basic computer use, curiosity, willingness to lab.
Course Content
Module 1 β Cybersecurity Foundations & AI Primer (β8 hrs)
-
L1.1 Security Basics
-
L1.2 SOC 101
-
L1.3 Assets & Telemetry
-
L1.4 AI in Cyber (Analystβs Primer)
-
Lab (Module 1)