top of page
Artboard 100_2x.png

The Easiest and Fastest Way to Your
High-Paying 
Cyber Security Career 

Promo_SOCdrills_10%+.png

VIDEO
Learn How to Get Your Dream Cyber Security Job

Land Your First Cyber Security Analyst Job The Smart Way

Secure Your Future and Make the Switch to Cyber Security Today

Pass the Program

We’ll teach you everything you need to know to launch your cyber security career

Work 1:1 Mentor

Your mentor will help you craft a Cyber Security Analyst job search, practice interviews

Start Your New Career

You’ll join a community of SOCdrills graduates working at top companies

4 Step-by-Step Courses in 35-50hrs 

Cyber_Security_Analyst_Overview.png

OVERVIEW

Junior

1 Quiz, 2 Labs

1 Cyber Drill

3-5 Hrs

$60K-80K

$99

Cyber_Security_Analyst_One.png

CYBER SECURITY ANALYST ONE

SOC Analyst

5 Quiz, 5 Labs, 16 Use Cases

10-15 Hrs

$80K-$100K

$998

Cyber_Security_Analyst_Two.png

CYBER SECURITY ANALYST TWO

SOC Specialist

5 Quiz, 5 Labs, 14 Use Cases

10-15 Hrs

$100-$130K

$1,298

Cyber_Security_Analyst_Three.png

CYBER SECURITY ANALYST THREE

SOC Incident Responder

8 Cyber Drills

10-15 Hrs

$130K-$160

$1,298

Paul_Qiu_Headshot_edited.jpg

Paul Qiu

Steve-Lawford-LinkedIn-Image.jpg

Steve Lawford

Ettienne_Head_Shot_Cyber-Landing.jpg

Ettienne Fourie

Olaf-Headshot_SOCdrills.gif

Olaf Krohmann

logo-cisco-systems-font-brand-product-logo-hmi-1e260eee5dbcdb5dd2adc565ad1ff6b4_edited.png
logo-cisco-systems-font-brand-product-logo-hmi-1e260eee5dbcdb5dd2adc565ad1ff6b4_edited.png
logo-cisco-systems-font-brand-product-logo-hmi-1e260eee5dbcdb5dd2adc565ad1ff6b4_edited.png

Paul Qiu and his Veteran Team Have Trained and Inspired Thousands of SOC Teams in the Largest Organisations Across the Globe

Paul Qiu and his team first came together at CISCO where they built one of the World’s top military-grade cyber ranges and Cyber Security training programs. They are leaders in Cyber Security architecture and training worldwide. The team has been designing, building, installing, and training enterprise Cyber Security teams across the globe for the past 19 years.

 

After leaving CISCO the team got together to take all their years of experience and know-how to build their dream Start-up, SOCdrills. The mission was to make Cyber Security training easy, fast and very affordable. The reason why SOCdrills exists is to get you your dream job in a world-class Cyber Security team.

Why Was This Program Created?

The purpose for this eLearning program is to give you real-life, on-the-job training and practical skills that are in demand by the industry. This isn’t your typical theoretical dive into the world of SOC offered by other courses. You will be gaining the experience that SOC teams are screaming out for when you go for your job interview.

 

What is unique about what you’ll experience is our military-grade cyber range, live-fire Labs and SOC Drills. Having real hands-on experience on a SOC simulator of this caliber will make you stand apart from your competition.

Who is This Program For?

IT GRADUATE

You're a University Graduate with an IT related degree looking to get your first job. Problem is you have no practical on-the-job experience.  You need help with crafting the right resume and with the interview process. You need that edge to put you in front of the pack and get you across the line.

IT PROFESSIONAL

You’re an IT Networking Professional wanting to upgrade your career and switch to the higher paying Cyber Security Industry. The problem is you work full-time and are time poor. You want to get the facts and learn efficiently.  You don’t want to go through more years and years of university study if you don’t have to.

3 Simple Reasons Why You'll Get the Job?

Land Your First SoC Analyst Job The Smart Way

Secure Your Future and Make the Switch to Cyber Security Today

You'll operate, maintain & take responsibility for a real-live, authentic SOC 

 (Not a simulation)​

You'll practice and compete on a world-class, military-grade, enterprise-level cyber range

Cyber-Landing-TRANSPARENT-LOGO_BLACK.png

You'll gain must-know insider secrets from one of the most  experienced SoC architect & training teams in the world

Learn Only the Skills Employers are Looking For

This SOCdrills program covers all the core fundamentals you will need to get the job.  Course units include practical SOC maintenance, learning resources, practice labs, practical drills, and career-related coursework. Here is a preview.

SOC ARCHITECTURE

Cyber_Landing_Network-Diag-2.001.jpeg

A Security Operation Center (SOC) is a centralized function within an organization employing people, processes, and technology to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to cybersecurity incidents.

NIST FRAMEWORK

Cyber_Landing_NIST_Hero.001.jpeg

The NIST Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organisations  can assess and improve their ability to prevent, detect, and respond to cyber attacks.

MITRE ATT&CK

Cyber_Landing_Mitre_Attack_Hero.001.jpeg

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats. They're displayed in matrices that are arranged by attack stages, from initial system access to data theft or machine control.

APT KILL CHAIN

Kill Chain1.001.jpeg

The kill chain model describes an attack by an external attacker attempting to gain access to data or assets inside the security perimeter. The attacker performs reconnaissance, intrusion of the security perimeter, exploitation of vulnerabilities, gaining and escalating privileges, lateral movement to gain access to more valuable targets, attempts to obfuscate their activity, and finally exfiltrate data from the organization.

Email Security

Email-Security.jpg

Email security describes different techniques for keeping sensitive information in email communication and accounts secure against unauthorised access, loss or compromise. Email is often used to spread malware, spam and phishing attacks.

Firewall

Firewall.jpg

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defence in network security for over 25 years.

Identity

Identity.jpg

Identity and Access Management is a Cyber/Information security discipline that ensures right people have appropriate access to the organization's critical systems and resources at the right time.

NfSen-Netflow

NSen.jpg

NfSen is a graphical web based front end for the nfdump netflow tools. NfSen allows you to: Display your netflow data: Flows, Packets and Bytes using RRD (Round Robin Database). Easily navigate through the netflow data.

Web Security

Network_Security.jpg

Web security means protecting a website or web application by detecting, preventing and responding to cyber threats.This integral division of Information Security is vital to the protection of websites, web applications, and web services.

Security Intelligence

Security-Intelligence.jpg

Security Intelligence is the collection, evaluation, and response to data generated on an organization's network undergoing potential security threats in real-time. This platform was developed from log management, SIEMs, NBADs, and network forensics.

WAF

WAF.jpg

A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a website or web application. A WAF can be either network-based, host-based or cloud-based and is often deployed through a reverse proxy and placed in front of one or more websites or applications.

Why is a Career in Cyber Security Right for Me?

Get in early

The industry is in desperate need to fill vacant positions

Higher rates of pay

With high demand the industry is commanding higher rates of pay

Grow with the sector

This is a ground floor opportunity  with potential to rise quickly in the ranks as the industry blossoms

Cyber_Security_Analyst_Overview.png

Cyber Security Analyst Overview

Discover a Smarter Way to Get Your Dream Job

Cyber Security Analyst Overview

 

This Cyber Security Analyst Overview course is to help you decide if a job in a Cyber Security is for you. You will focus on the foundational components of a SOC, including:

​

  1. Gain a working knowledge of a world-class SOC

  2. Totally immerse yourself in Cyber Landing’s military-grade cyber range

  3. Take in the cutting-edge of SOC architecture

  4. Get your hands dirty with 2 live-fire cyber range practice labs

 

Make sure, you’ve got what it takes to join a SOC team You will develop a straightforward understanding of key concepts and practices without all the unnecessary fluff and time wasting.

 

You will get a practical experience of what a job in a real-life SOC is really like.

 

Before you invest your time, money and energy take the time to complete this course.

Course Outline

 

Module 1

Comprehensive SOC, Cyber Range & Architecture Overview eLearning course with knowledge checks throughout and a quiz at the end.

​

Module 2

Complete Cyber Landing’s cyber range video guided demonstration.

 

Module 3

Practice LAB 1.0. Experience Cyber Landing’s military-grade cyber range.

 

Module 4

Practice LAB 2.0. Experience Cyber Landing’s military-grade cyber range.

 

Module 5

SOCdrills Practice 1.  Get your first taste of a real-live SOCdrill.

​

Module 6

Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

Cyber_Security_Analyst_One.png

Cyber Security Analyst One

Your First Step Into Your New Cyber Security Career

Cyber Security Analyst One

 

This eLearning course is a SOC Analyst Level certificate. You will cover these 5-critical SOC must-knows including:

​

  1. SIEM

  2. Firewall

  3. IPS

  4. WEB Security

  5. Email Security

Course Outline

 

Module 1

SIEM eLearning presentation with knowledge checks throughout and a quiz at the end.

​

Module 2

SIEM Lab 1, 2 & 3.

 

Module 3

Firewall eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 4

Firewall Lab 1. Sun Flood Attack, 2. DDoS, 3. Packet Capture

 

Module 5

IPS eLearning presentation with knowledge checks throughout and a quiz at the end.

​

Module 6

IPS Lab 1. Login Brute Force Attack, 2. External ScaN Reconnaissance, 3. Detect Wannacry Attack, 4. Mobile Malware Attack

 

Module 7

Web Security eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 8

Web Security Lab 1. Malware Detection, 2. Reputation Based Detection, 3. HTTP Response Codes.

 

Module 9

Email Security eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 10

Email Security Lab 1. Malware Detection, 2. Spam Detection, 3. Illegal Content Detection.

 

Module 11

Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

 

Module 12

Optional eLearning Forum.

Cyber_Security_Analyst_Two.png

Cyber Security Analyst Two

Now Your Really Getting the Hands-On Experience You Need

Cyber Security Analyst Two

 

This eLearning course is a SOC Analyst Level certificate. You will cover these 5-critical SOC must-knows including:

​

  1. Identity

  2. NetFlow

  3. WAF

  4. Threat Intelligence

  5. Incident Response

Course Outline

 

Module 1

Identity eLearning presentation with knowledge checks throughout and a quiz at the end.

​

Module 2

Identity Lab 1. Brute Force, 2. Credential Stuffing, 3. Privilege Escalation

 

Module 3

NetFlow eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 4

NetFlow Lab 1. C&C, 2. External Scan Reconnaissance, 3. DLP

 

Module 5

WAF eLearning presentation with knowledge checks throughout and a quiz at the end.

​

Module 6

WAF Lab 1. SQL Injection, 2. Cross Site Scripting.

 

Module 7

Threat Intelligence eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 8

Threat Intelligence Lab 1. IP Reputation, 2. Domain Reputation, 3. Hash Reputation.

 

Module 9

Incident Response eLearning presentation with knowledge checks throughout and a quiz at the end.

 

Module 10

Incident Response Lab 1, 2 & 3.

 

Module 11

Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

 

Module 12

Optional eLearning Forum.

Cyber_Security_Analyst_Three.png

Cyber Security Analyst Three

You're Going to Gain a Very Unique Perspective of Cyber Crime

Cyber Security Analyst Three

​

Cyber Security Analyst Cert Three is truly a unique experience and unlike any other Cyber Security training program you’ll find anywhere.

 

To understand why and how we designed this Certificate you need to put yourself in the shoes of a SOC Team.

 

Ultimately, it’s the SOC Team’s responsibility to protect the company from cyber threats.  This can be a daunting task given the ever-changing world of cybercrime they face, daily.

 

SOC Teams are under pressure and need the best people they can get to help them.  The more skills and level of experience you can bring to the table the more inclined they will be to welcome you aboard.

 

The problem is if you haven’t worked in a SOC before how can you assure them of your ability to help?  It’s the chicken and egg dilemma.

 

This is what Cyber Security Analyst Cert Three is all about.

 

The team at SOCdrills include some of the World’s most experienced SOC architects and trainers. Over the past 12-years they have travelled non-stop across the globe advising, designing, building and training world-class SOC teams. Today, many of the team are still working at the highest level in some of the World’s best SOC teams.

 

To this end we’ve delivered a program that will give you the direct experience, on one of the best cyber ranges to help you get the job.  Make no mistake, not all cyber ranges are equal.

 

In the competitive world of getting into the SOC team of your dreams you need an edge.  Mastering these SOC Drills will give you a point of difference and help give confidence to get you on board the team.

Course Outline

 

Cyber Attack is in progress! You need to condition yourself to the concept of “Zero Trust Security”, meaning you do not trust any hosts or devices on your network.  An attack can come from anywhere in your network: inside, outside, overseas or local. You will be under pressure to thwart a multitude of attacks ranging from Malware, Ransomware, DDoS, Trojans and Viruses etc. This is pure threat hunting at its best. Total visibility is the key.

 

8-Unique, Live-Fire SOC Drills (8-12hrs)

 

Leading-Edge APT (Advanced Persistent Threats) Case Studies 1 to 8

​

Mentoring.png

Mentoring Program

Do You Have What it Takes?

MENTORING PROGRAM

 

To get into the Mentoring program it is highly recommended that you successfully complete the Cyber Security Analyst Three Certificate and contact us to apply. This is an intense, one-on-one, 8-hour program over 8-weeks, designed to get you your dream job:

​

  1. Understanding your work and technical background

  2. Choose your cyber security career path

  3. Discover the most suitable roles to apply for

  4. Initial CV and LinkedIn Review with followup ​

  5. Technical & behaviour interview preparation and guidance ​

  6. Technical interview simulation

  7. Behaviour interview simulation

  8. Interview feedback plus review and guidance in salary negotiation 

The 6-Steps to Getting Your Dream Job

You Will Get Results Guaranteed!

1.

CCNA or Equivalent

​

Have foundational IT network skills from study or through practical experience

​

Prerequisite

4.

Mentoring

Program

It is highly recommended to complete SOC I,II,III.  Must apply for admittance.

8 hrs over 8 weeks

2.

SOC & Cyber Range Overview

Begin with this overview to make sure this is the right path for you.

3-5 hrs

5.

MiniSOC

Internship

As a mentoring candidate you will get experience in a real-live SOC

1-month

3.

Cyber Security Analyst

I, II, III

Most practical, real-life cyber security training you can get without all the fluff.

35-50 hrs

6.

COMING SOON!

​

New Live-fire Drills each quarter subscription

​

12-month

What Our Customers are Saying?

Headshots_SOCdrills_Henry.gif

Henry Wang

Easy to understand and doesn't waste your time.

Donnie_Yang_Photo_3_edited.png

Donnie Yang

This will help you like it helped me get my dream job in a SOC.

Jacky-Liu_edited.png

Jacky Liu

This is the best SOC eLearning certification training in the world.

The 7-Reasons Why SOCdrills is Right For You?

Relax 1_2x-8.png

01

Our Brilliant Award Winning Team

02

Hands-on Practice Labs, Drills & Cyber Range are Simply the Best in the World

03

This e-Learning Path is the Only One Today That Focuses 100% on Getting You a Job in a SOC

04

Getting a Job in a SOC is the Smartest Way to Move-Up and Earn More Money

05

Turn Your Free Time Into Money!

06

The Most Cost-Effective SOC Training Program in the World!

07

Ask About Our Brilliant Mentoring Program?

Early Access Bundle Specials!

Certified_Front_Page_Catelogue_Cyber_Security_Analyst_Bundle-1,2.png

20%OFF

Now $1,837

Was $2,296

Certified_Front_Page_Catelogue_Cyber_Security_Analyst_Bundle-1,2,3.png

20%OFF

Now $2,875

Was $3,594

Certified_Front_Page_Catelogue_Cyber_Security_Analyst_Bundle-O,1,2.png

20%OFF

Now $1,916

Was $2,395

Certified_Front_Page_Catelogue_Cyber_Security_Analyst_Bundle-O,1,2,3.png

20%OFF

Now $2,954

Was $3,693

It Just Might Be the Best Investment You'll Ever Make

Promo_SOCdrills_10%+.png

In Short, This Will Help You Earn More Money!

  • LinkedIn
bottom of page