Run a full SOC simulation before moving to reading resources.
Operating Systems & Security
Track your progress through this week's content
Opening Framing: Putting It All Together
Over the past eleven weeks, you've built a comprehensive
foundation in security operations. You've learned monitoring,
detection, triage, incident response, threat intelligence,
hunting, and automation. Now it's time to apply everything
in a realistic scenario.
This capstone simulates a day in a Security Operations Center.
You'll handle an alert queue, investigate incidents, make
decisions under pressure, document your work, and produce
deliverables that demonstrate professional competency.
The scenario is designed to test not just individual skills,
but your ability to integrate them—triaging efficiently,
investigating thoroughly, responding appropriately, and
communicating clearly.
Key insight: Real SOC work requires integrating many skills
simultaneously. This capstone demonstrates that integration.
Capstone Scenario: Acme Financial Services
You're a SOC analyst at Acme Financial Services, a mid-sized
financial institution. It's Monday morning, and you're starting
your shift.
Organization Profile:
- 2,500 employees
- Headquarters + 12 branch offices
- Customer-facing web applications
- Internal trading systems
- Regulated industry (financial services)
Security Stack:
- SIEM: Splunk Enterprise Security
- EDR: CrowdStrike Falcon
- Firewall: Palo Alto Networks
- Email: Microsoft 365 with Defender
- SOAR: Splunk SOAR
Your Role:
- Tier 1/2 SOC Analyst
- Shift: 8 AM - 4 PM
- Responsibilities: Alert triage, investigation, escalation
Current Situation:
- Weekend was quiet (automated systems only)
- Several alerts accumulated overnight
- One ongoing investigation from Friday (handed off)
- Threat intel report about financial sector targeting
Part 1: Shift Handoff Review
Review the handoff from the previous shift:
SHIFT HANDOFF - Sunday Night to Monday Morning
Analyst: Sarah Chen
Time: 2024-01-14 23:45 UTC
OPEN INCIDENTS:
INC-2024-0112: Suspicious PowerShell Activity
- Status: Under investigation
- Host: TRADE-WS-07 (Trading floor workstation)
- User: mrodriguez (Senior Trader)
- Summary: EDR detected encoded PowerShell execution
- Actions taken:
* Alert triaged, escalated to Tier 2
* Memory dump collected
* User notified, asked not to use system
- Next steps: Malware analysis of memory dump
- Priority: HIGH
ALERT QUEUE STATUS:
- 23 alerts pending triage
- Oldest alert: 6 hours
- Mix of EDR, firewall, and email alerts
ENVIRONMENTAL NOTES:
- Patch Tuesday updates rolling out this week
- Trading systems maintenance window: Tuesday 2-4 AM
- New threat intel: APT targeting financial sector (see TI-2024-0115)
ITEMS FOR INCOMING ANALYST:
1. Continue INC-2024-0112 investigation
2. Review TI-2024-0115 and check for related IOCs
3. Clear alert backlog - prioritize by severity
Your Task:
Review the handoff notes
Prioritize your work for the shift
Document your shift plan
Part 2: Alert Triage Queue
Your alert queue contains the following alerts. Triage each one.
Alert 1: Failed Login Attempts
ALERT: Multiple Failed Logins
Time: 2024-01-15 02:34 UTC
Source: Active Directory
Target: VPN Gateway
Account: svc_backup
Failures: 47 in 10 minutes
Source IPs: 185.220.101.XX (Tor exit node)
Status: Failures only, no success
Time Management:
- Allocate time before starting
- Don't get stuck on one alert
- Leave time for documentation
Prioritization:
- High impact + high confidence = highest priority
- Consider business context
- Document your reasoning
Investigation:
- Follow the evidence
- Don't assume—verify
- Map to ATT&CK as you go
Documentation:
- Write as you work, not after
- Be specific and factual
- Include evidence for conclusions
Professionalism:
- Write for your audience
- Be clear and concise
- Proofread before submission
Week 12 Outcome Check
By completing this capstone, you will have demonstrated:
Alert triage and prioritization skills
Investigation methodology
Incident documentation
Threat intelligence application
Communication skills (technical and executive)
Professional judgment and decision-making
Congratulations! Completing this capstone demonstrates you have
the skills expected of an entry-level SOC analyst.
🛡️ Capstone Extension: Harden & Defend
Enterprise SOCs do more than investigate. They harden systems,
deploy detection, and document baselines for future response.
Apply CIS Level 1 hardening to one Windows and one Linux host
Define a baseline of expected services and processes
Plan SIEM + EDR coverage for critical systems
Create a short runbook for baseline drift and alerts
Deliverable: Hardening checklist + monitoring plan + runbook summary.
🎯 Hands-On Labs (Free & Essential)
Run a full SOC simulation before moving to reading resources.
🎮 TryHackMe: SOC Level 1
What you'll do: Triage alerts, investigate evidence, and make response decisions.
Why it matters: This mirrors day-to-day SOC analyst work.
Time estimate: 2-3 hours
Task: Produce a shift report with triage log, incident timeline, and executive summary.
Deliverable: One report that combines findings, actions, and recommendations.
Why it matters: Clear reporting is as critical as the investigation.
Time estimate: 1.5-2 hours
🎮 TryHackMe: SOC Level 2 (Stretch)
What you'll do: Tackle harder scenarios with deeper investigation steps.
Why it matters: Stretching here prepares you for real-world escalation.
Time estimate: 2-3 hours
What you'll do: Complete the hardening and monitoring tasks defined above.
Deliverable: Baseline checklist + SIEM/EDR coverage plan + runbook summary.
Why it matters: Strong baselines reduce alert noise and improve response speed.
Time estimate: 2-3 hours
💡 Lab Tip: Treat documentation as part of the response, not an afterthought.
Resources
Reference these resources as you complete your capstone.
This capstone represents the culmination of your security
operations journey in CSY201. You've progressed from understanding
SOC concepts to performing analyst work in a realistic scenario.
Reflect on these questions:
Compare your understanding of SOC work now versus Week 1.
What aspects are clearer? What remains challenging?
Which skills from this course do you feel most confident
in? Which areas need more development?
How did the capstone scenario compare to your expectations
of SOC work? What surprised you?
What would you do differently if you could repeat the
capstone?
Where do you want to specialize in security operations?
(Detection engineering, threat hunting, incident response,
automation, etc.)
A strong final reflection will honestly assess your growth,
identify areas for continued learning, and articulate your
career direction.
What's Next?
Completing CSY201 opens doors to specialized security topics:
CSY202 - Ethical Hacking:
Penetration testing methodology and techniques
CSY203 - Web Application Security:
OWASP Top 10, web vulnerabilities, secure development
CSY204 - Digital Forensics:
Evidence collection, analysis, and investigation
CSY205 - Cloud Security:
Securing AWS, Azure, and GCP environments
Certifications to Consider:
CompTIA CySA+ (Cybersecurity Analyst)
GIAC GSOC (Security Operations Certified)
Splunk Core Certified User
Blue Team Level 1 (BTL1)
Congratulations on completing CSY201! You now have a solid
foundation in security operations—one of the most in-demand
areas of cybersecurity. SOC skills are immediately applicable
and highly valued. The monitoring, detection, investigation,
and response capabilities you've developed will serve you
throughout your security career. Keep learning, keep practicing,
and welcome to the blue team!