EC-Council
Into the Trenches: Security Operations Center

Heat up your career this summer with courses from Google, IBM, and more for £190/year. Save now.

EC-Council

Into the Trenches: Security Operations Center

EC-Council

Instructor: EC-Council

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

13 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

13 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Explore Enterprise Security Structure

  • Deep Dive into the basics of incident response 

  • Understand modern threat and attacker TTPs 

  • Gain a basic primer to Security Onion 

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

23 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your Security expertise

This course is part of the Information Security Analyst Professional Certificate
When you enroll in this course, you'll also be enrolled in this Professional Certificate.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate from EC-Council

There are 9 modules in this course

In this Section, we will set ourselves up with tools needed to perform network monitoring as well as targets to practice these techniques against.

What's included

2 videos1 reading2 assignments1 discussion prompt

What exactly is a SOC and why are they important? This section will cover the high-level concept of a Security Operations Center and Enterprise Operations.

What's included

2 videos3 assignments

To defend a network, we must first understand the types of threats we need to defend against. This section will cover modern tactics, techniques, and procedures attackers are using from gaining initial access to a compromised network, moving around inside the network, and eventually exiling or causing damage.

What's included

2 videos3 assignments

Monitoring massive networks comprised of thousands of endpoints and hundreds of applications is a daunting task. To help make the process more approachable SOCs deploy various security tools to help monitor and identify potential attacks. This section will cover some of the more common tools used in SOCs.

What's included

3 videos4 assignments

SOC analysts spend a large amount of time analyzing network events and logs looking for oddities that might indicate an attack of some sort. There are lots of tools and techniques used to do this activity. This section will give a foundation for what event monitoring, indicators of compromise, and threat hunting are.

What's included

3 videos3 assignments

Everyday there are new vulnerabilities announced for software and hardware devices deployed across the globe. Attackers take these announcements and immediately look for ways to take advantage of them. A key component of enterprise defense operations is to reduce the potential attack surface with a process known as vulnerability management. Vulnerability management is an art all to itself and in this section, we will talk about some of the ways to help master the artform.

What's included

1 video2 assignments

More and more organizations are in the news with reports of them being “hacked”. If you work at a SOC you will have security incidents that require urgent attention. This section will discuss the basic principles of incident response.

What's included

1 video2 assignments

In this section we will summarize some of the major ideas and key takeaways that we have been learning about as well as discuss ways to continue to grow our knowledge.

What's included

1 video

This module underscores the importance of SIEM solutions, the key challenges of traditional SIEM and understanding of next generation SIEM.

What's included

3 videos4 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

EC-Council
EC-Council
7 Courses83,882 learners

Offered by

EC-Council

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions