The Into the Trenches: Security Operations Center course prepares learners for real-world security operations.

Heat up your career this summer with courses from Google, IBM, and more for £190/year. Save now.


Into the Trenches: Security Operations Center
This course is part of Information Security Analyst Professional Certificate

Instructor: EC-Council
Included with
Recommended experience
What you'll learn
Explore Enterprise Security Structure
Deep Dive into the basics of incident response
Understand modern threat and attacker TTPs
Gain a basic primer to Security Onion
Skills you'll gain
- Security Controls
- Incident Response
- Threat Detection
- Network Monitoring
- Cyber Threat Hunting
- Data Loss Prevention
- Event Monitoring
- Network Security
- Intrusion Detection and Prevention
- Computer Security Incident Management
- Vulnerability Management
- Enterprise Security
- Cyber Operations
- Cyber Threat Intelligence
- Security Information and Event Management (SIEM)
Details to know

Add to your LinkedIn profile
July 2025
23 assignments
See how employees at top companies are mastering in-demand skills

Build your Security expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from EC-Council

There are 9 modules in this course
In this Section, we will set ourselves up with tools needed to perform network monitoring as well as targets to practice these techniques against.
What's included
2 videos1 reading2 assignments1 discussion prompt
What exactly is a SOC and why are they important? This section will cover the high-level concept of a Security Operations Center and Enterprise Operations.
What's included
2 videos3 assignments
To defend a network, we must first understand the types of threats we need to defend against. This section will cover modern tactics, techniques, and procedures attackers are using from gaining initial access to a compromised network, moving around inside the network, and eventually exiling or causing damage.
What's included
2 videos3 assignments
Monitoring massive networks comprised of thousands of endpoints and hundreds of applications is a daunting task. To help make the process more approachable SOCs deploy various security tools to help monitor and identify potential attacks. This section will cover some of the more common tools used in SOCs.
What's included
3 videos4 assignments
SOC analysts spend a large amount of time analyzing network events and logs looking for oddities that might indicate an attack of some sort. There are lots of tools and techniques used to do this activity. This section will give a foundation for what event monitoring, indicators of compromise, and threat hunting are.
What's included
3 videos3 assignments
Everyday there are new vulnerabilities announced for software and hardware devices deployed across the globe. Attackers take these announcements and immediately look for ways to take advantage of them. A key component of enterprise defense operations is to reduce the potential attack surface with a process known as vulnerability management. Vulnerability management is an art all to itself and in this section, we will talk about some of the ways to help master the artform.
What's included
1 video2 assignments
More and more organizations are in the news with reports of them being “hacked”. If you work at a SOC you will have security incidents that require urgent attention. This section will discuss the basic principles of incident response.
What's included
1 video2 assignments
In this section we will summarize some of the major ideas and key takeaways that we have been learning about as well as discuss ways to continue to grow our knowledge.
What's included
1 video
This module underscores the importance of SIEM solutions, the key challenges of traditional SIEM and understanding of next generation SIEM.
What's included
3 videos4 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Explore more from Security
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,