{"id":19293,"date":"2025-09-18T12:50:39","date_gmt":"2025-09-18T10:50:39","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?page_id=19293"},"modified":"2025-12-11T09:30:12","modified_gmt":"2025-12-11T08:30:12","slug":"parcours-analyste-soc-security-operations-center","status":"publish","type":"page","link":"https:\/\/acgcyberacademy.fr\/en\/parcours-analyste-soc-security-operations-center\/","title":{"rendered":"Parcours Analyste SOC (Security Operations Center)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"19293\" class=\"elementor elementor-19293\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b7ab1 e-flex e-con-boxed e-con e-parent\" data-id=\"a3b7ab1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c770fdf e-flex e-con-boxed e-con e-child\" data-id=\"c770fdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cedb2b elementor-widget elementor-widget-heading\" data-id=\"3cedb2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Operations Center certification course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d0ffda e-grid e-con-full e-con e-child\" data-id=\"1d0ffda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1851309 elementor-widget elementor-widget-text-editor\" data-id=\"1851309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reference : SECSOC<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1456de0 elementor-widget elementor-widget-text-editor\" data-id=\"1456de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Duration: 8 days (56 hours)<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f1a01d e-con-full e-flex e-con e-child\" data-id=\"8f1a01d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83e1163 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"83e1163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;center&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"138285411\" aria-label=\"Onglets. Ouvrez des \u00e9l\u00e9ments avec Entrer ou Espace, fermez-les avec Echape et naviguez \u00e0 l&#039;aide des touches fl\u00e9ch\u00e9es.\" data-no-translation-aria-label=\"\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1382854111\" data-tab-title-id=\"e-n-tab-title-1382854111\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1382854111\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTER\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1382854112\" data-tab-title-id=\"e-n-tab-title-1382854112\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1382854112\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tINTRA\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1382854111\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854111\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-14f8ed1 e-con-full e-flex e-con e-child\" data-id=\"14f8ed1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da3d952 elementor-widget elementor-widget-text-editor\" data-id=\"da3d952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost :\u00a0<strong>On request<\/strong><\/p><div class=\"info_label\">Category:<strong>\u00a0<\/strong><\/div><div class=\"info_label\"><strong>Cybersecurity<\/strong><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1382854112\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1382854112\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-bddcf25 e-con-full e-flex e-con e-child\" data-id=\"bddcf25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e185992 elementor-widget elementor-widget-text-editor\" data-id=\"e185992\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our in-company training courses are customised, flexible and tailored to the specific needs of your team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b2245 elementor-align-center elementor-widget elementor-widget-global elementor-global-8968 elementor-widget-button\" data-id=\"a2b2245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjYxNTkiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">I WOULD LIKE A QUOTE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8c41f elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"3e8c41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the brochure<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98f6d9f e-flex e-con-boxed e-con e-parent\" data-id=\"98f6d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f60c80 elementor-widget elementor-widget-heading\" data-id=\"4f60c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prerequisite knowledge<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc72b9 elementor-widget elementor-widget-text-editor\" data-id=\"1bc72b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"209\" data-end=\"492\">The SOC Analyst course requires knowledge of networks and a good understanding of the basics of cybersecurity. It is recommended that you have followed the introductory course in cybersecurity or have equivalent knowledge before enrolling on this course.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7805952 elementor-widget elementor-widget-heading\" data-id=\"7805952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trainee profile<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a983c elementor-widget elementor-widget-text-editor\" data-id=\"d5a983c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"527\" data-end=\"917\">This course is aimed at systems and network technicians and administrators, IT managers, security consultants, engineers and technical managers. It is also of interest to network architects and project managers wishing to develop or deepen their skills in the field of operational security and SOC centres.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579caa9 elementor-widget elementor-widget-heading\" data-id=\"579caa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objectives<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aace03e elementor-widget elementor-widget-text-editor\" data-id=\"aace03e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"988\" data-end=\"1080\">Understanding the role and tasks of a SOC analyst.<\/li><li data-start=\"1083\" data-end=\"1182\">Master the fundamentals of defensive cyber security.<\/li><li data-start=\"1185\" data-end=\"1270\">Use SOC tools and technologies.<\/li><li data-start=\"1273\" data-end=\"1363\">Analyse and correlate security events.<\/li><li data-start=\"1366\" data-end=\"1440\">Managing security incidents.<\/li><li data-start=\"1366\" data-end=\"1440\">Writing technical reports.<\/li><li data-start=\"1520\" data-end=\"1630\">Working in coordination with other cyber security teams.<\/li><li data-start=\"1633\" data-end=\"1732\">Monitor cyber threats and attack techniques.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3373781 elementor-widget elementor-widget-heading\" data-id=\"3373781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Certification prepared<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f470f5e elementor-widget elementor-widget-text-editor\" data-id=\"f470f5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>No<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9df2183 elementor-widget elementor-widget-heading\" data-id=\"9df2183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Teaching methods<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed7c2c elementor-widget elementor-widget-text-editor\" data-id=\"5ed7c2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Provision of one workstation per trainee<\/li><li>Digital teaching documentation provided during the course<\/li><li>The course is made up of theoretical contributions, practical exercises, reflections and feedback.<\/li><li>Attendance at this training course gives rise to the signature of an attendance sheet.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb3725 elementor-widget elementor-widget-heading\" data-id=\"aeb3725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trainer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8561ef8 elementor-widget elementor-widget-text-editor\" data-id=\"8561ef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Expert consultant and trainer in Cybersecurity and SOC<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4218c0a elementor-widget elementor-widget-heading\" data-id=\"4218c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessment methods<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2020fbb elementor-widget elementor-widget-text-editor\" data-id=\"2020fbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"3164\" data-end=\"3269\">Practical exercises and workshops at every stage of the course.<\/li><li data-start=\"3272\" data-end=\"3384\">A case study linking the different skill blocks.<\/li><li data-start=\"3387\" data-end=\"3499\">Quiz at the end of each day's training.<\/li><li data-start=\"3387\" data-end=\"3499\">Self-assessment of knowledge acquired by the trainee via a questionnaire.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d25ab elementor-widget elementor-widget-heading\" data-id=\"b8d25ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Course content<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47cd54b elementor-widget elementor-widget-n-accordion\" data-id=\"47cd54b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7520\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-7520\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 1: Introduction to the SOC and its missions  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-7e45716 e-con-full e-flex e-con e-child\" data-id=\"7e45716\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7520\" class=\"elementor-element elementor-element-49b5f98 e-flex e-con-boxed e-con e-child\" data-id=\"49b5f98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2af96a elementor-widget elementor-widget-text-editor\" data-id=\"e2af96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 1 - Morning: Introduction to the SOC and its missions<\/strong><\/p><ul><li>Definition and objectives of a Security Operations Centre (SOC).<\/li><li>Types of SOC: in-house, shared, outsourced, hybrid.<\/li><li>Main tasks: prevention, detection, reaction, anticipation.<\/li><li>Key roles: N1\/N2\/N3 analysts, SOC manager, threat hunter, SIEM engineer.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 1 - Afternoon: Introduction to the SOC and its missions<\/strong><\/p><ul><li>SOC service catalogue: 24\/7 monitoring, incident management, threat intelligence, reporting.<\/li><li>Structure and operation: governance, human resources, ITIL\/ISO 27035 processes.<\/li><li>Resources required: human, logistical, applications.<\/li><li>Case study: comparison between internal SOC and MSSP.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7521\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7521\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 2: Perimeter defences and detection systems  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7521\" class=\"elementor-element elementor-element-89e5876 e-con-full e-flex e-con e-child\" data-id=\"89e5876\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df8f5e4 elementor-widget elementor-widget-text-editor\" data-id=\"df8f5e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 2 - Morning: Perimeter defences and detection systems<\/strong><\/p><ul><li>Firewalls: types (static, dynamic, NGFW).<\/li><li>Proxy: SSL inspection, URL filtering, access policy.<\/li><li>Centralised management of security policies.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 2 - Afternoon: Perimeter defences and detection systems<\/strong><\/p><ul><li>IDS\/IPS: differences, detection by signature vs. behaviour.<\/li><li>Examples of alerts and concrete cases of blocked attacks.<\/li><li>Practical workshop: basic firewall \/ IDS configuration and alert interpretation.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7522\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7522\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 3: Vulnerability management  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7522\" class=\"elementor-element elementor-element-ca6c2a7 e-con-full e-flex e-con e-child\" data-id=\"ca6c2a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-099e760 elementor-widget elementor-widget-text-editor\" data-id=\"099e760\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 3 - Morning: Vulnerability management<\/strong><\/p><ul><li>Presentation of scanners (Nessus, Qualys, OpenVAS).<\/li><li>Vulnerability management cycle: identification, assessment, remediation, validation.<\/li><li>Correlation with CVSS and business criticality.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 3 - Afternoon: Vulnerability management<\/strong><\/p><ul><li>Study of a scan report: prioritising vulnerabilities.<\/li><li>Communication methods with IT teams for remediation.<\/li><li>Practical workshop: interpreting and prioritising a simulated scan.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7523\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7523\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 4: SIEM and security monitoring  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7523\" class=\"elementor-element elementor-element-fbd0b9b e-flex e-con-boxed e-con e-child\" data-id=\"fbd0b9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c504e elementor-widget elementor-widget-text-editor\" data-id=\"d9c504e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 4 - Morning: SIEM and security monitoring<\/strong><\/p><ul><li>SIEM architecture (Splunk, QRadar, ELK).<\/li><li>Collecting and standardising logs (Windows, Linux, network equipment, applications).<\/li><li>Correlation rules and alert scenarios.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 4 - Afternoon: SIEM and security monitoring<\/strong><\/p><ul><li>Log investigation: search for IoCs and suspicious events.<\/li><li>Creation of supervision dashboards.<\/li><li>Practical workshop: incident simulation and alert search in the SIEM.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7524\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7524\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 5: Implementation and legal aspects <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7524\" class=\"elementor-element elementor-element-8df4acb e-flex e-con-boxed e-con e-child\" data-id=\"8df4acb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-720b65a elementor-widget elementor-widget-text-editor\" data-id=\"720b65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 5 - Morning: Setting up and legal aspects<\/strong><\/p><ul><li>Legal framework: RGPD, CNIL, ISO 27001, ISO 27035, evidential value of logs.<\/li><li>Confidentiality, storage and traceability obligations.<\/li><li>Rules of digital evidence in the event of litigation.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate the knowledge acquired.<br \/>acquired.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 5 - Afternoon: Implementation and legal aspects<\/strong><\/p><ul><li>Steps involved in setting up a SOC :<\/li><li>Design: identification of business needs, definition of objectives, choice of tools and appropriate architecture.<\/li><li>Build: deployment of the infrastructure, integration of SIEM and IDS\/IPS, implementation of operating procedures.<\/li><li>Run: operational use, alert monitoring, optimisation of detection rules, gradual ramp-up.<\/li><li>Case study: assessment of a newly deployed SOC.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7525\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7525\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 6: Steering, indicators and continuity  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7525\" class=\"elementor-element elementor-element-26880fe e-flex e-con-boxed e-con e-child\" data-id=\"26880fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a542bf2 elementor-widget elementor-widget-text-editor\" data-id=\"a542bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 6 - Morning: Steering, indicators and continuity<\/strong><\/p><ul><li>Definition and monitoring of KPI\/KRI.<\/li><li>Dashboards for CISOs and COMEX.<\/li><li>Continuous improvement process and management of non-conformities.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul><p><strong>\u00a0<\/strong><\/p><p><strong>Day 6 - Afternoon: Steering, indicators and continuity<\/strong><\/p><ul><li>PCA\/PRA applied to the SOC.<\/li><li>Managing relations with internal customers and external service providers.<\/li><li>SOC outsourcing: advantages, limitations, contractual clauses.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7526\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7526\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 7: Case study (workflow, incident typology, practical situation)  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7526\" class=\"elementor-element elementor-element-8835775 e-flex e-con-boxed e-con e-child\" data-id=\"8835775\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb1955 elementor-widget elementor-widget-text-editor\" data-id=\"2bb1955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 7 - Case study<\/strong><\/p><ul><li>Presentation of an operational SOC and its technical architecture.<\/li><li>Incident escalation workflow : N1 \u2192 N2 \u2192 N3 \u2192 CERT.<\/li><li>Typology of common incidents: phishing, malware, DDoS, data leakage.<\/li><li>Practical exercises:<ul><li>Investigation of simulated incidents,<\/li><li>Analysis of SIEM\/EDR alerts,<\/li><li>Remediation decision and internal communication.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt<\/li><\/ul><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-7527\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-7527\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 8: Simulation and conclusion of training (incidents, report, feedback, evaluation)  <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-7527\" class=\"elementor-element elementor-element-5c76f10 e-flex e-con-boxed e-con e-child\" data-id=\"5c76f10\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aaeef46 elementor-widget elementor-widget-text-editor\" data-id=\"aaeef46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Day 8 - Simulation and end of training<\/strong><\/p><ul><li>Full incident simulation: APT, ransomware, active directory compromise.<\/li><li>Teamwork: SOC roles, investigation, coordination.<\/li><li>Drafting of a technical report and an executive report.<\/li><li>Oral presentation to a mock management committee.<\/li><li>Intelligence session: overview of current threats and future trends.<\/li><li>Closing and final assessment.<\/li><li>Attendance certificates are handed out and participants evaluate the course.<ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate what has been learnt.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af79e0 e-con-full e-flex e-con e-parent\" data-id=\"7af79e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f9592d elementor-widget elementor-widget-spacer\" data-id=\"7f9592d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Parcours certifiant Security Operations Center R\u00e9f\u00e9rence : SECSOC Dur\u00e9e : 8 jours (56 heures) INTER INTRA Co\u00fbt :\u00a0Sur demande Cat\u00e9gorie :\u00a0Cybers\u00e9curit\u00e9 Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre \u00e9quipe. Co\u00fbt :\u00a0Sur demande Cat\u00e9gorie :\u00a0Cybers\u00e9curit\u00e9 Nos formations intra-entreprise sont personnalis\u00e9es, flexibles et align\u00e9es sur les besoins sp\u00e9cifiques de votre [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"class_list":["post-19293","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/parcours-analyste-soc-security-operations-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/parcours-analyste-soc-security-operations-center\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T08:30:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/cropped-cropped-acg-cyber-academy-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-analyste-soc-security-operations-center\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-analyste-soc-security-operations-center\\\/\",\"name\":\"Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"datePublished\":\"2025-09-18T10:50:39+00:00\",\"dateModified\":\"2025-12-11T08:30:12+00:00\",\"description\":\"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-analyste-soc-security-operations-center\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-analyste-soc-security-operations-center\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/parcours-analyste-soc-security-operations-center\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parcours Analyste SOC (Security Operations Center)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy","description":"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/parcours-analyste-soc-security-operations-center\/","og_locale":"en_GB","og_type":"article","og_title":"Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy","og_description":"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.","og_url":"https:\/\/acgcyberacademy.fr\/en\/parcours-analyste-soc-security-operations-center\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-12-11T08:30:12+00:00","og_image":[{"width":200,"height":100,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/cropped-cropped-acg-cyber-academy-logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/parcours-analyste-soc-security-operations-center\/","url":"https:\/\/acgcyberacademy.fr\/parcours-analyste-soc-security-operations-center\/","name":"Formation Analyste SOC Cybers\u00e9curit\u00e9 | ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"datePublished":"2025-09-18T10:50:39+00:00","dateModified":"2025-12-11T08:30:12+00:00","description":"Formez-vous au m\u00e9tier d\u2019Analyste SOC avec ACG Cyber Academy : ma\u00eetrisez la d\u00e9tection, la r\u00e9ponse aux incidents et la d\u00e9fense cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/parcours-analyste-soc-security-operations-center\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/parcours-analyste-soc-security-operations-center\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/parcours-analyste-soc-security-operations-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Parcours Analyste SOC (Security Operations Center)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=19293"}],"version-history":[{"count":19,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19293\/revisions"}],"predecessor-version":[{"id":22060,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/pages\/19293\/revisions\/22060"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=19293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}