BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//wp-events-plugin.com//6.4.7.3//EN
BEGIN:VEVENT
UID:863@acinfotec.com
DTSTART:20260819T023000Z
DTEND:20260821T093000Z
DTSTAMP:20260107T092732Z
URL:https://www.acinfotec.com/training-event/certified-soc-analyst-csa-exa
 m-included-2/
SUMMARY:Certified SOC Analyst | CSA (Exam Included)
DESCRIPTION:\nAbout this course\nThe Certified SOC Analyst (CSA) program is
  the first step to joining a security operations center (SOC). It is engin
 eered for current and aspiring Tier I and Tier II SOC analysts to achieve 
 proficiency in performing entry-level and intermediate-level operations.\n
 \nCSA is a training and credentialing program that helps the candidate acq
 uire trending and in-demand technical skills through instruction by some o
 f the most experienced trainers in the industry. The program focuses on cr
 eating new career opportunities through extensive\, meticulous knowledge w
 ith enhanced level capabilities for dynamically contributing to a SOC team
 . Being an intense 3-day program\, it thoroughly covers the fundamentals o
 f SOC operations\, before relaying the knowledge of log management and cor
 relation\, SIEM deployment\, advanced incident detection\, and incident re
 sponse. Additionally\, the candidate will learn to manage various SOC proc
 esses and collaborate with CSIRT at the time of need. To read more about S
 OC and how they are important to many industries\nIndustries That Must Hav
 e a (SOC)\nMany industries are dependent on Security Operations Management
 \, including:\n\nWhy Must Organizations Have Log Management and a SOC Team
 ?\nLog management is an organized approach to deal with large volumes of c
 omputer-generated log data. It allows multiple operations on data like gen
 eration\, collection\, centralization\, parsing\, transmission\, storage\,
  archival\, and disposal.\n\nOrganizations have a Security Operations Cent
 er team and a log management solution in order to:\n\n\n 	Comply with appl
 icable regulatory standards such as PCI-DSS\, HIPAA\, RMiT\, ISO 27001\, a
 nd others.\n 	Protect servers storing sensitive data from internal and ext
 ernal threats.\n 	Secure proprietary information and intellectual property
 .\n\n\nBesides log management\, Security Operations Center analysts can al
 so integrate Security Information and Event Management (SIEM) tools in the
 ir process. These software tools aggregate security data from multiple sou
 rces\, such as network devices\, servers\, and other locations. SIEM tools
  then connect the dots to discover the trends and detect cyber threats so 
 that organizations can act on the alerts.\nHow Does a SOC Help?\n\n 	For t
 he Payment Card Industry (PCI)\, it is mandatory to maintain a Security
  Operations Center. According to the PCI Compliance Security Standard Coun
 cil\, any merchant processing and storing credit card data should be PCI c
 ompliant. PCI compliance helps to ensure secure online transactions and pr
 otection against identity theft.\n 	In such a scenario\, a SOC team helps 
 to:\n 	Monitor firewalls\, their logs\, and any configuration change to id
 entify an irregularity.\n 	Increase the speed of incident remediation.\n 	
 Check firewall and router configuration standards by comparing them  with
  documented services\, ports\, and protocols.\n\n&nbsp\;\n\nAs the healthc
 are industry contains crucial health data\, such as holistic reports of pa
 tients including personalized diagnoses and treatments\, it is an alluring
  target to cybercriminals. Threat actors monetize patient data by selling 
 it to the highest bidder or blackmailing the victim.\n\nFor keeping protec
 ted health information (PHI) secure\, healthcare organizations require a S
 OC 2 audit. SOC 2 compliance ensures:\n\n 	Customer trust\n 	Brand reputat
 ion\n 	Business continuity\n 	Competitive advantage\n\n&nbsp\;\n\n\n\nThe
  manufacturing sector has always been a vulnerable industry as it posses
 ses intellectual property and advanced technologies. Consider a Department
  of Defense (DoD) contractor for example: It is a must to meet the NIST cy
 bersecurity standards to maintain DFARS (Defense Federal Acquisition Regul
 ation Supplement) compliance. The NIST SP 800-171 outlines guidelines for 
 Audit and Accountability\, Configuration Management\, Identification\, and
  Authentication\, with several other criteria.\nSOC analysts are needed in
  the manufacturing industry to:\n\n 	Set up alerts to monitor potential th
 reats.\n 	Promptly remediate ongoing and possible security threats.\n\n&nb
 sp\;\n\n\n\nCybercriminals are eyeing financial services for their bulk 
 transactions and real-time monitoring of activities. Apart from external a
 ttacks\, institutions are also vulnerable to lost employee devices (like p
 hones) and insider threats.\n\nBanking and Financial services should perfo
 rm SOC Type 1 and SOC Type 2 audits along with annual SOC 1 SSAE 18 report
 s. Being in clear nexus with the Internal Control Over Financial Reporting
  (ICFR) concept\, these audits effectively report on internal controls. Th
 ey reveal:\n\n 	Weaknesses in security controls like improperly provisione
 d information systems\, weak authentication parameters\, lack of multiple 
 layers of security\, and others.\n 	Shortcomings in operational controls.\
 n 	Flaws in documentation.\n\n&nbsp\;\n\n\n\nAs government agencies store 
 personal information along with criminal records and religious and politic
 al inclinations\, they are a prized target for cyber attackers.\n\nGovernm
 ent institutions need SOC teams for:\n\n 	Network monitoring in real time.
 \n 	Analyzing activities on servers\, endpoints\, and databases.\n 	Lookin
 g for an incident or signs of a breach.\n\n&nbsp\;\n\n&nbsp\;\n\n\n\nEduca
 tion establishments are easy targets for cybercriminals. They not only car
 ry personal data but also valuable research data and allow access to large
 r networks.\n\nA Security Operations Center can help an educational instit
 ution’s IT staff respond to growing security threats by:\n\n 	Identifyin
 g and monitoring institutional assets and data.\n 	Neutralizing threats.\n
  	Providing cybersecurity metrics to the IT staff.\n\n&nbsp\;\nTarget Audi
 ence\n\n 	SOC Analysts (Tier I and Tier II)\n 	Network and Security Admini
 strators\, Network and Security Engineers\, Network Defense Analyst\, Netw
 ork Defense Technicians\, Network Security Specialist\, Network Security O
 perator\, and any security professional handling network security operatio
 ns\n 	Cybersecurity Analyst\n 	Entry-level cybersecurity professionals\n 	
 Anyone who wants to become a SOC Analyst.\n\nLearning Objectives of CSA\n\
 n 	Gain Knowledge of SOC processes\, procedures\, technologies\, and workf
 lows.\n 	Gain a basic understanding and in-depth knowledge of security thr
 eats\, attacks\, vulnerabilities\, attacker’s behaviors\, cyber killchai
 n\, etc.\n 	Able to recognize attacker tools\, tactics\, and procedures to
  identify indicators of compromise (IOCs) that can be utilized during acti
 ve and future investigations.\n 	Able to monitor and analyze logs and aler
 ts from a variety of different technologies across multiple platforms (IDS
 /IPS\, end-point protection\, servers\, and workstations).\n 	Gain knowled
 ge of the Centralized Log Management (CLM) process.\n 	Able to perform Sec
 urity events and log collection\, monitoring\, and analysis.\n 	Gain exper
 ience and extensive knowledge of Security Information and Event Management
 .\n 	Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSS
 IM/ELK).\n 	Understand the architecture\, implementation and fine-tuning o
 f SIEM solutions (Splunk/AlienVault/OSSIM/ELK).\n 	Gain hands-on experienc
 e in SIEM use case development process.\n 	Able to develop threat cases (c
 orrelation rules)\, create reports\, etc.\n 	Learn use cases that are wide
 ly used across the SIEM deployment.\n 	Plan\, organize\, and perform threa
 t monitoring and analysis in the enterprise.\n 	Able to monitor emerging t
 hreat patterns and perform security threat analysis.\n 	Gain hands-on expe
 rience in the alert triaging process.\n 	Able to escalate incidents to app
 ropriate teams for additional assistance.\n 	Able to use a Service Desk ti
 cketing system.\n 	Able to prepare briefings and reports of analysis metho
 dology and results.\n 	Gain knowledge of integrating threat intelligence i
 nto SIEM for enhanced incident detection and response.\n 	Able to make use
  of varied\, disparate\, constantly changing threat information.\n 	Gain k
 nowledge of Incident Response Process.\n 	Gain understating of SOC and IRT
  collaboration for better incident response.\n\n\nTraining Info\nDuration:
   3 Days\nDate:  Aug 19 - 21\, 2026\nTime:  9.30 am. – 16.30 pm.\nVe
 nue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\,000 Baht (ex.vat 7%)\
 nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\nwww.ecco
 uncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/12/CSA.png
CATEGORIES:EC-Council
END:VEVENT
END:VCALENDAR