starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Certifications
  2. >
  3. Security Operations Center Analyst Certification

Security Operations Center Analyst Certification

Understanding how cybersecurity works is a key skill in technology today. Whether you are a full-stack developer, a business professional, or a young professional looking to specialize in cybersecurity, this professional certification provides you with the essential foundational security skills you will need. This includes helping you to understand and implement Wireshark, defensive strategies, building a cyber range, penetration testing, intrusion analysis, and intrusion handling, among other things.
Arbaz Khan
Kevin Cardwell
Mohammad Adly
Mohammad AdlyKevin Cardwell...
Data Science | core | 30 hours

    Discussions

Overview

1.3KSTUDENTS*
94%RECOMMEND*

This journey includes:

  • 6+ hours of on-demand video
  • 8 modules
  • Core level
  • Direct access/chat with the instructor
  • 100% self-paced online
  • Many downloadable resources
  • Shareable certificate of completion
Understanding how cybersecurity works is a key skill in technology today. Whether you are a full-stack developer, a business professional, or a young professional looking to specialize in cybersecurity, this professional certification provides you with the essential foundational security skills you will need. This includes helping you to understand and implement Wireshark, defensive strategies, building a cyber range, penetration testing, intrusion analysis, and intrusion handling, among other things.

Skills You Will Gain

Cloud Security
Intrusion Analysis

Learning Outcomes (At the end of this program you will be able to)

  • Articulate the fundamental issues in cybersecurity today
  • Understand the key tools available in Wireshark for security
  • Explain and apply essential cybersecurity defensive strategies
  • Build a “Cyber Range”
  • Discuss penetration testing
  • Describe intrusion analysis
  • Appreciate and conduct intrusion handling

Who Should Attend

  • Security professionals
  • Others involved in maintaining IT security protocols within an organization

Curriculum

Experts

Frequently Asked Questions

How much do the courses at Starweaver cost?

We offer flexible payment options to make learning accessible for everyone. With our Pay-As-You-Go plan, you can pay for each course individually. Alternatively, our Subscription-Based plan provides you with unlimited access to all courses for a monthly or yearly fee.

Do you offer any certifications upon completion of a course at Starweaver?

Yes, we do offer a certification upon completion of our course to showcase your newly acquired skills and expertise.

Does Starweaver offer any free courses or trials?

No, we don't offer any free courses, but we do offer 5-day trial only on our subscriptions-based plans.

Are Starweaver's courses designed for beginners or advanced students?

Our course is designed with three levels to cater to your learning needs - Core, Intermediate, and Advanced. You can choose the level that best suits your knowledge and skillset to enhance your learning experience.

What payment options are available for Starweaver courses?

We accept various payment methods such as major credit cards, PayPal, wire transfer, and company purchase orders. For more information related to payments contact customer support.

Do you offer refunds?

Yes, we do offer a 100% refund guarantee for our courses within a specified time frame. If you are not satisfied with the course, contact our customer support team to request a refund with your order details. Some restrictions may apply.

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark

Understanding and Navigating Network Security: From A-Z

Understanding and Navigating Network Security: From A-Z

Part 2: Analyzing and Defending Networks with Wireshark

This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field.

Part 1: Understanding and Navigating Network Security: From A-Z

This course introduces computer networks security technologies and tools for network admins and cybersecurity officers and makes you fully aware of the wired and wireless computer network's basics, devices, and protocols at a step-by-step pace.

Becoming a Cyber Warrior Certification Program

Becoming a Cyber Warrior Certification Program

Part 3: Becoming a Cyber Warrior Certification Program

This course provides you key skills of cybersecurity including: Building a Security Skills Foundation; Leveraging Wireshark for Security; Essential Defensive Strategies; Building a Cyber Range; Penetration Testing; & Intrusion Analysis and Handling.

Learn Python With 20+ Real World Projects

Learn Python With 20+ Real World Projects

Part 4: Learn Python With 20+ Real World Projects

This Course Is for beginners as well as intermediate Python developers who want to create real-world applications / projects using python programming language with 20+ practical projects.

1Welcome to the course!
2Module 1 - Course Overview
3Module 2 - Course Setup: First Steps of Protocol Analysis
4Module 3 - Network Communication at the Packet Level
5Module 4 - TCP/IP Foundation
6Module 5 - Starting your first capture
7Module 6 - Working with Capture Files in Wireshark
8Module 7 - Analyzing Packet Captures
9Module 8 - Examining Protocol Communication
10Module 9 - Bonus Capture Files
11Module 10 - The Steps of Professional Hacking
1Welcome!
2LiveLabs
3Developing Security Skills - Skill Deficiencies
4Leveraging Wireshark for Security
5Essential Defensive Strategies
6Building a Cyber Range
7Penetration Testing
8Intrusion Analysis
9Intrusion Handling
1Welcome to the course!
2Module 01: Introduction to Computer Networks
3Module 02: ISO/OSI Model (7 Layers)
4Module 03: TCP/IP Protocol Suite
5Module 04: Wireless Networks
6Module 05: Computer Networks Security
7Module 06: Firewalls and Honeypots
8Module 07: Intrusion Detection and Prevention Systems (IDS/IPS)
9Module 08: Wireless Networks Security
10Module 09: Physical Security and Incident Handling
11Module 10: Computer Networks Security Conclusion
1Welcome to the course!
2Module 1: Introduction
3Module 2: Development Environment Setup
4Module 3: Python Basics
5Module 4: Project 1
6Module 5: Project 2
7Module 6: Project 3
8Module 7: Project 4
9Module 8: Project 5
10Module 9: Project 6
11Module 10: Project 7
12Module 11: Project 8
13Module 12: Project 9
14Module 13: Project 10
15Module 14: Project 11
16Module 15: Project 12
17Module 16: Project 13
18Module 16: Project 14

About this course: Overview, Learning Outcomes, Prerequisites & Target Audience

Instructor Bio: Kevin Cardwell

A message from your instructor

Key pointers for success in this course

Segment - 15 - Introduction

Segment - 16 - Saving the capture to a file

Segment - 17 - Advanced Capture Methods

Segment - 18 - Advanced Capture Scenario Analysis Methods With Wireshark.

Segment - 08 - Introduction

Segment - 09 - Protocol Analysis at the Network Level using Wireshark

Segment - 10 - Interpreting Connections and Protocols

Segment - 11 - Intermediate Protocol Analysis of static captures using Wireshark.

About this course: Overview, Learning Outcomes, Who Should Enroll...

Instructor bio - Kevin Cardwell

Arbaz Khan

Arbaz Khan

With a passion for technology and a commitment to excellence, Arbaz Khan is a Computer Science Engineer devoted to advancing the field through both research and teaching. Recognized globally from a young age for his academic contributions, Arbaz has authored two research papers published in international journals—one of which earned copyright protection from the Government Copyright Office of India.

Over the years, he has educated more than 250,000 students worldwide, delivering high-impact programming courses across 12 different e-learning platforms. His areas of expertise include Research, IoT, Python, and Data Science, and he is known for combining comprehensive instruction with hands-on projects that empower learners with real-world skills.

Proficient in programming languages such as C, C++, Java, and Python, Arbaz enables students to automate everyday tasks, explore innovative projects in AI, ML, IoT, Automation, and Robotics, and apply their learning in practical contexts. He channels this mission through his startup, GetSetCode (GSC), a hub for tech-driven innovation.

Arbaz also serves as an AI Architect at Data Binaries, where he designs customized AI solutions for client applications, and is the Founder of Crashcode.tech, a platform focused on mentoring aspiring software developers. As an instructor on renowned platforms including Udemy, Skillshare, and codedamn, his dedication to education reaches learners across the globe.

He holds a Master's degree in Computer Science & Engineering from PES College of Engineering, Aurangabad, and continues to bridge the gap between theoretical knowledge and practical application in the rapidly evolving tech landscape.

VIEW MY CHANNEL
Mohammad Adly

Mohammad Adly

Mohammad Adly is a distinguished expert in computer engineering and electronic sciences, holding a Ph.D. focused on enhancing congestion control mechanisms for internet media traffic. His doctoral research at Menoufiya University introduced advanced methodologies aimed at optimizing network performance for media applications, making significant contributions to the field of network traffic management. He also earned an M.Sc. from the same institution, where his thesis centered on video services for remote work within IP environments, showcasing his deep expertise in video communication technologies.

His strong academic foundation in computer networks was further reinforced through an Information Technology Diploma from the Information Technology Institute (ITI), followed by research experience at the IRISA Institute, Rennes I University in France. There, he explored innovative solutions in network security and performance, gaining valuable international research exposure.

Mohammad holds several prestigious certifications, including the Lean Six Sigma Green Belt and multiple GIAC security certifications. He has contributed extensively to the academic community through numerous publications covering topics such as TCP-friendly rate control, media traffic congestion control, and adaptive video streaming systems. His work has been featured in leading journals and international conferences, reflecting his dedication to advancing technology and its real-world applications.

VIEW MY CHANNEL

Segment - 02 - Download and Install Wireshark

Segment - 03 - Work with Wireshark

Segment - 04 - Review the first packet capture in Wireshark

Kevin Cardwell

Kevin Cardwell

Kevin Cardwell is a cybersecurity expert with extensive experience working with banks and financial institutions across the Middle East, Europe, and the UK. A former leader of a U.S. Department of Defense Red Team, he achieved an impressive 100% success rate in system compromise operations, demonstrating unparalleled expertise in identifying and exploiting vulnerabilities.

Kevin has led high-impact consulting projects, including engagements with Petroleum Development Oman and the Central Bank of Oman. His work includes the design and implementation of customized security baselines for high-profile clients such as Oman Airport Management Company (OAMC), ensuring resilient protection for critical infrastructure.

He is the author of several acclaimed cybersecurity courses and publications, including Building Virtual Pentesting Labs for Advanced Penetration Testing and Advanced Penetration Testing for Highly Secured Environments, 2nd Edition. His areas of specialization include advanced penetration testing, network defense, and security architecture.

As President of Cyber2Labs and Lead Consultant at CESI, Kevin continues to shape the cybersecurity landscape, helping organizations build strong digital defenses against emerging threats. He holds certifications such as Certified Advanced Network Defender and Certified Advanced Penetration Tester, underscoring his commitment to excellence in information security.

In addition to his hands-on expertise, Kevin is a passionate educator and instructor, dedicated to equipping learners with the knowledge and practical skills necessary to navigate the complex world of cybersecurity with confidence. He actively promotes cutting-edge cybersecurity practices and is a trusted voice in the field for both professionals and organizations.

VIEW MY CHANNEL

Segment - 01 - Introduction

Segment - 16 - Wireless Networks Benefits

Segment - 17 - Wireless Networks Types

Segment - 18 - Wireless Networks Protocol (Wi-Fi)

Segment - 19 - Wireless Networks Devices

Segment - 20 - Wireless Networks Drawbacks

Segment - 12 - Introduction

Segment - 13 - Live capture exercise

Segment - 14 - Analyzing the live capture using Wireshark.

Developing Security Skills Skill Deficiencies

Security Skills Command Line Code TCP IP

Typical Security Model Security Posture Security Policy

Network Protocols Transport Protocols

Flow Of Data

Unix And Linux

Virtualization

Lab - Command Line

Lab - Security Model

Lab - Protocol Analysis

Lab - Allow a Service

Segment - 26 - Why Using a Firewall?

Segment - 27 - Firewalls Rules

Segment - 28 - Firewalls Filtering

Segment - 29 - Honeypots

Segment - 30 - Bypassing Firewalls

Segment - 21 - Introduction

Segment - 22 - Attacking the network communication and identifying artifacts with Wireshark

Segment - 23 - Applying your skills to identify potential incidents within Wireshark captures

About this course: Overview, Learning Outcomes, Who Should Enroll...

About this course: Overview, Learning Outcomes, Who Should Enroll...

TMI Good And The Bad

The Bad And The Ugly

Vulnerability Management

Ingress Egress Filtering

Secure Network Architectures

Lab - Vulnerability Sites

Lab - Nmap Vulnerability Scripts

Lab - OpenVAS

Lab - Nessus

LiveLab - 001 - Building a Cyber Range

LiveLab - 002 - Intrusion Analysis (Resources at: https://bit.ly/3fj4fVF)

LiveLab - 003 - TCP/IP

LiveLab - 004 - UNIX-LINUX

LiveLab - 005 - Virtualization and Introduction to the Hacking Mindset

LiveLab - 006 - Vulnerability Management

Filter Session Content Interface Customization

Statistics

Computer Incidents

Establishing A Computer Forensic Methodology-I

Establishing A Computer Forensic Methodology-II

Segment - 03 - What is Python?

Segment - 04 - Python Basics

Segment - 05 - Message

Segment - 11 - Introduction to Computer Networks Protocols

Segment - 12 - IP Protocol

Segment - 13 - TCP and UDP Protocols

Segment - 14 - Application Protocols

Segment - 15 - TCP/IP Characteristics and Tools

Segment - 05 - Introduction

Segment - 06 - Analyze Client to Server Communication with the Wireshark User Interface.

Segment - 07 - Your first protocols

Segment - 21 - Security Goals

Segment - 22 - Securing the Network Design

Segment - 23 - TCP/IP Security and Tools

Segment - 24 - Port Scanning and Tools

Segment - 25 - Sniffing and Tools

Segment - 06 - Screenshot App

Segment - 07 - Screenshot GUI

Segment - 06 - Why ISO/OSI Model?

Segment - 07 - Application, Presentation, and Session Layers

Segment - 08 - Transport and Network Layers

Segment - 09 - Data Link and Physical Layers

Segment - 10 - ISO/OSI Model in Action

Segment - 09 - Email Sender

Segment - 24 - Bonus-File1 capture file

Segment - 25 - Bonus-File1 Solution

Segment - 26 - Bonus File2 capture File

Segment - 27 - Bonus-File2 Solution

Segment - 36 - Wired Equivalent Privacy WEP Attacking

Segment - 37 - WPA and AES Protocols

Segment - 38 - Wireless Security Misconceptions

Segment - 39 - Wireless Attacks and Mitigation

Segment - 40 - Secure Network Design with Wireless

Segment - 01 - Introduction

Segment - 10 - Speed Test

Segment - 19 - Introduction

Segment - 20 - Creating Wireshark filters

Segment - 14 - Text To Speech

Segment - 15 - Speech To Text

Segment - 19 - Weather App

Segment - 13 - Chrome Automation

Segment - 28 - The first step of professional hacking scanning methodology

Segment - 29 - The second step of the professional hacking methodology

Segment - 30 - The third step of the professional hacking methodology

Segment - 31 - The fourth step of the professional hacking methodology

Segment - 32 - The fifth step of the professional hacking methodology

Segment - 33 - The sixth step of the professional hacking methodology

Segment - 01 - What is a Computer Network?

Segment - 02 - Computer Networks Topologies

Segment - 03 - Computer Networks Categories

Segment - 04 - Computer Networks Devices and Services

Segment - 05 - Computer Networks Transmission Media

Intrusion Detection

Functions Of IDS

Under Attack

Stop The Attack Intrusion Prevention

Types Of IPS

Identifying The OS Methodology Of Network Analysis

Demo

Lab - Data Analysis

Lab - Basic Attacks

Lab - SMB

Lab - Advanced Attacks

Segment - 11 - Covid-19 Updater Bot

Network Protocols

ARP Address Resolution Protocol

DNS Domain Name System

TFTP Trival File Transfer Protocol

TCP-Transmission Control Protocol

TCP Data Flow

Demo Wireshark

Lab - IP Header

Lab - Client to Server

Lab - Sessions

Lab - Filters

Segment - 41 - Physical Security Objectives

Segment - 42 - Physical Threats and Mitigation

Segment - 43 - Defense in Depth (DiD)

Segment - 44 - What is an Incident?

Segment - 45 - Incident Handling

Penetration Testing Unveild

Security Testing Plan Abstract Methodology

Non Intrusive

Google Hacking Basics Intrusive Exploit

Pentest Framework Sample Architecture

Detailed Findings Conclusion

Demo

Lab - Domain Lookup

Lab - DNS Enum

Lab - Nmap

Lab - Nmap against defenses

Vulnerability Sites Lab Virtual Machines

Virtual Machine Creation Components Of Virtual Network

More Components

Network Security Toolkit Folders Planning

Virtual Design Replying Captured Traffic

Demo Just A Part

Lab - Routing

Lab - Routing part two

Lab -Install DHCP

Lab - Configure DHCP Server

Segment - 08 - Password Generator

Segment - 31 - What is Intrusion Detection Systems (IDS)?

Segment - 32 - Network IDS (NIDS)

Segment - 33 - NIDS Challenges

Segment - 34 - Snort as NIDS

Segment - 35 - Intrusion Prevention Systems (IPS)

Segment - 12 - OCR Image To Text

Segment - 02 - Development Environment Setup

Segment - 46 - Confidentiality, Integrity, and Availability (CIA)

Segment - 47 - Assets, Threats, and Vulnerabilities

Segment - 48 - Risks and Network Intrusion

Segment - 49 - Common Attacks

Segment - 50 - Security Recommendations

Segment - 16 - Webcam App

Segment - 18 - Face Detection

Segment - 17 - Screen Recorder

Segment - 20 - URL Shortener