Security Operations Centre ยท Australia

SOC Analyst
Exam Prep

Master every topic a SOC analyst needs โ€” from SIEM and log analysis to MITRE ATT&CK and cloud security. Exam-style questions with detailed explanations.

13 Topics
65 Questions
Instant Explanations
Progress Saved
60s Timer
๐Ÿ“Š ๐Ÿ” โšก ๐Ÿ›ก โœ“ โš 
๐ŸŽฏ
13
Topic Areas
โ“
65
Questions
โฑ
60s
Per Question
๐Ÿ’พ
Auto
Progress Saved
๐Ÿ”–
Yes
Bookmarks

๐Ÿ“š Choose a Topic to Study

Each topic has 5 exam-style questions with detailed explanations. Your progress is saved automatically.

๐Ÿ›๏ธ
Start Here
Fundamentals
Core concepts every SOC analyst must know โ€” SOC roles, CIA Triad, basic networking, Windows and Linux OS basics.
SOC RolesCIA TriadTCP/IPWindowsLinux
0/5 completed
๐ŸŒ
Essential
Networking & Protocols
TCP vs UDP, common ports, DNS/DHCP/ARP, HTTP request/response, and packet analysis with Wireshark.
TCP/UDPPortsDNSHTTPWireshark
0/5 completed
๐Ÿ›ก๏ธ
Core Knowledge
Security Fundamentals
Types of attacks (phishing, malware, DDoS, brute force), MFA, OAuth, firewalls, VPNs, and Zero Trust.
PhishingRansomwareMFAZero TrustDDoS
0/5 completed
๐Ÿ“Š
Most Important
SIEM
Security Information & Event Management โ€” log collection, analysis, writing queries and alerts, Splunk, QRadar, Sentinel.
SplunkQRadarSentinelLog CorrelationAlerts
0/5 completed
๐Ÿงพ
Practical Skill
Log Analysis
Windows Security/System/Application logs, Linux /var/log, web server logs, and firewall log interpretation.
Windows LogsLinux LogsEvent IDsWeb LogsFirewall
0/5 completed
๐Ÿšจ
Critical Skill
Incident Detection & Response
What is an incident, the IR lifecycle (detection through recovery), alert triage, true/false positives.
IR LifecycleTriageContainmentEradicationRecovery
0/5 completed
๐Ÿ”
Key Skill
Threat Intelligence
IOCs, OSINT tools, threat feeds, VirusTotal, AbuseIPDB โ€” how to research and contextualise threats.
IOCOSINTVirusTotalThreat FeedsAbuseIPDB
0/5 completed
๐Ÿงช
Essential
Endpoint Security (EDR/XDR)
What is EDR/XDR, monitoring endpoints, detecting suspicious processes, CrowdStrike and Microsoft Defender.
EDRXDRCrowdStrikeDefenderProcess Analysis
0/5 completed
๐Ÿงฐ
Toolbox
Security Tools You Must Know
Nmap, Burp Suite, Metasploit, and Nessus โ€” what they do, when to use them, and why analysts need to know them.
NmapBurp SuiteMetasploitNessusScanning
0/5 completed
๐Ÿง 
Must Know
MITRE ATT&CK Framework
Attack techniques & tactics, TTP mapping, the ATT&CK Navigator, and real-world attack scenario analysis.
TacticsTechniquesTTPNavigatorThreat Mapping
0/5 completed
โ˜๏ธ
High Demand in AU
Cloud Security
AWS basics, IAM, CloudTrail, GuardDuty, and the shared responsibility model โ€” critical for Australian SOC roles.
AWSIAMCloudTrailGuardDutyShared Responsibility
0/5 completed
๐Ÿง‘โ€๐Ÿ’ป
Practical Skill
Scripting Basics
Python for SOC automation, Bash for Linux log analysis, and PowerShell for Windows investigations.
PythonBashPowerShellAutomationLog Parsing
0/5 completed
๐Ÿ“‘
Industry Standards
Compliance & Standards
ISO 27001, NIST CSF, GDPR basics, ACSC Essential Eight โ€” how compliance relates to security operations.
ISO 27001NISTGDPRACSC E8Auditing
0/5 completed
โฑ
60-Second Timer
Each question has a 60-second countdown. Adds exam pressure and helps track your speed.
Active
๐Ÿ’พ
Progress Saved
Your answers are saved in the browser. Close and resume anytime โ€” no login needed.
Active
๐Ÿ”–
Bookmark Questions
Flag tricky questions for later review. Bookmarks persist across sessions.
Active
๐Ÿ“Š
Topic Score Tracking
See correct/wrong counts per topic on the topic page. Identify where to focus.
Active
๐Ÿ’ก
Full Explanations
Every question includes a detailed explanation covering the 'why' behind the correct answer.
Active
๐ŸŽ“
Junior Difficulty
All questions are calibrated for Junior SOC analyst level โ€” ideal for career starters.
Active