This project demonstrates hands-on experience and practical applications from SOC Level 1 training on Cybrary. It covers key aspects of security operations, including Defensive Security Fundamentals, Log Analysis, Host-Based Detection, and Network-Based Detection. The project utilizes industry-standard tools such as Wazuh, Elastic Stack, Kibana, The Hive, and Linux to analyze security events, detect threats, and respond to incidents. π₯οΈ
Overview
Tools Used
Project Structure
Defensive Security Fundamentals
Log Analysis
Host-Based Detection
Network-Based Detection
Installation & Setup
Use Cases
Contributions
License
Wazuh - Open-source SIEM and threat detection tool
Elastic Stack (Elasticsearch, Logstash, Kibana) - Log analysis and visualization
Kibana - Data visualization and dashboarding
The Hive - Security incident response platform
Linux - Host-based analysis and security monitoring
Project Structure πππ
### SOC_L1_Project/ βββ defensive_security_fundamentals/ βββ log_analysis/ βββ host_based_detection/ βββ network_based_detection/ βββ setup/ βββ use_cases/ βββ README.md
Covers core functions of defensive security, including:
Security Operations Center (SOC) roles and responsibilities
Cyber risk management and threat modeling
Security ticketing and incident tracking
Focuses on analyzing logs to detect security events:
Windows Event Logs analysis
SIEM fundamentals and log correlation
Incident response based on log patterns
Extends log analysis to detect threats at the endpoint level:
Endpoint Detection and Response (EDR) tools
Persistence mechanisms in Windows environments
Local and domain-based authentication events
Analyzes network traffic for anomalies and malicious activity:
Identifying network observables and indicators of compromise (IoCs)
Web activity logs and network packet analysis
Detecting and analyzing spearphishing attacks
Step-by-step setup for the tools used in this project:
Install Wazuh SIEM and configure log forwarding
Set up Elastic Stack for log processing and visualization
Deploy The Hive for incident management
Configure Linux-based monitoring for endpoint security
Detect failed login attempts in Windows Event Logs
Correlate logs with SIEM to identify brute force attempts
Investigate user behavior and take remediation actions
Analyze email headers and attachments for phishing indicators
Identify network traffic anomalies using Elastic Stack
Respond using The Hive for incident tracking and mitigation
Monitor process execution logs in Wazuh
Detect persistence mechanisms using Windows security logs
Isolate the affected host and conduct forensic analysis
Contributions are welcome! Feel free to submit pull requests or open issues to improve this project.
This project is licensed under the MIT License.###