Soc Specialist Path
Specialists in Cyber Defense:
Trained by experts
Access a practical path to becoming an internationally recognized SOC Specialist.
Obtain Official Certification and
Increase Your Market Value

The Certified Professional SOC Specialist (CPSS)* adheres to international standards and is recognised worldwide.
Fata Informatica is a Personnel Certification Body accredited under international ISO 17024:2012 standard.

- University
professors - 24/7 access to the course
- Tests and assessment exercises
- Downloadable material
- Final examination and certification


SOC Specialist Path
Our Soc Specialist Path is designed to offer a tailored learning experience with a modular and flexible approach, designed to adapt to your needs and pace. Thanks to the structure of our courses, you can start with the Basic Course to build a solid foundation, and continue with the Advanced Course to acquire advanced skills in the field of cybersecurity and obtain the most prestigious certifications.
CPSS certification is issued only if the requirements of the standard are met and after passing an official exam.
If the requirements are not met, it will be possible to take the exam to obtain CTSS certification (non-accredited certification).

Why participate in our cybersecurity courses?
From Zero to Expert quickly and easily
Start with the basic course to learn the fundamentals of security operations management and progress to the advanced course, where you will acquire in-depth threat hunting techniques and advanced monitoring skills, including on mobile devices.
Realistic Simulation Laboratories
You will have access to sophisticated simulation labs designed to replicate complex cybersecurity scenarios. This controlled environment is ideal for experimenting and honing your skills without the risks of the real world.
Acquiring the Secrets of Incident Monitoring and Response
You will receive constant support from the teacher
Our instructor Andrea Tassotti will guide you through the platform and answer all your questions.
Unlimited Access to Content and Resources
Study without time constraints with content accessible online 24/7, allowing you to organize your studies around your other commitments. You will have all the material you need to prepare for the final exam, ensuring flexible training at your own pace.
You will obtain prestigious certifications
(*) To obtain this certification, you must meet the prerequisites, which can be found on the website certificazioni.fatainformatica.it.
Teaching approach
The Teachers


He has an extensive background in academia, spanning Italy’s most elite institutions and currently lectures in Ethical Hacking and Malware Analysis at e-Campus University.
He is the author of the podcast ‘Cybersecurity & Cybercrime’.
The Company

We are the only Italian company to have been included by Gartner in its ‘Marketing Guide for IT monitoring tools’ thanks to our Sentinet3 product, developed in 2004 and now recognised as the leader in the Italian market.
We have created a business unit specialising in cybersecurity services, called CybersecurityUP, with the aim of providing vertical cybersecurity services to our customers, primarily the defence sector and companies of national strategic interest.
Course details
BASIC course
Course objectives
The Security Operation Center (SOC) is the hub of corporate IT operations, with the goal of ensuring infrastructure security through the definition of internal security and incident response actions against current or potential attacks. This course aims to develop specific technical skills to operate independently in a SOC. SOC specialists are in high demand on the market, with a significant shortage of available skills. The course covers TCP/IP networks, firewall configuration, IDS/IPS, SIEM, Packet Analyzer, and includes lessons on the basics of IT security such as Kill Chain, Malware, typical attacks, Social Engineering, etc.
1. Introduction to Cybersecurity
- Cyber Security
- What is a Cyber Attack
- Incident Response process
- CIA Triad
- Types of Hacker
- Cyber Theft Ring
- How much our personal dat is worth on the Dark Web
- Main actors
- Main attacks
- Techniques used
- Preferred vectors
- The Kill Chain
- Phases
- Targeting
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command & Control
- Example of an attack: Action
- Attack on the target
2. Networks
- TCP/IP protocols
- Packets
- ISO/OSI models
- TCP/IP models
- Levels
- Encapsulation
- Headers
- TCP
- IP
- Ethernet
- Internet Protocol
- Addresses
- Classful Network
- Netmasks
- IPv6
- IP routing
- Routing tables
- Autonomous system
- Routing protocols
- IGP protocols
- EGP protocols
- Distance Vector
- RIP
- Link State
- Path vector
- Data Link level
- MAC Addresses
- MAC Table
- Switches
- ARP protocol
- TCP and UDP
- Ports
- Headers
- Netstat commands
- Three way handshake
- DNS
- Structure
- Resolution
- DHCP protocol
- Phase
- DHCP discover
- DHCP offer
- DHCP request
- DHCP hack
- renewal
- Other protocols
- SNMP
- ICMP
- FTP
- SMTP
- IMAP
- POP3
- Packets
- WEB Applications
- HTTP protocol
- HTTP request
- HTTP response
- HTTPs
- Cookies
- HTTP sessions
- The systems to protect the network
- Proxy
- Firewalls
- Honeypots
- VPNs
- IDS/IPS systems
- DLP systems
3. Attacks and Vulnerabilities
- Web Application Vulnerabilities
- What is OWASP
- How a web application is composed
- The OWASP Top Ten
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- The Attacks
- What is a Zero-day
- DoS, DDoS and DRDoS
- Smurf
- Xmas Scan Attack
- Man-in-the-Middle
- Man-in-the-Browser
- Buffer Overflow
- Privilege Escalation
- ARP Poisoning
- DNS Poisoning
- Domain Hijacking
- Clickjacking
- Session Hijacking
- Spoofing
- MAC
- Phone
- Downgrade Attack
- Wi-Fi Attacks
- Wi-Fi Protocols
- Replay Attack
- Rogue AP
- Evil Twin
- WPS Attacks
- Bluetooth Attacks
- Bluejacking
- Bluesnarfing
- Bluebugging
- Cryptographic Attacks
- Hash Functions
- Pass the Hash
- Password Attacks
- Rainbow Tables
- Salt
- Dictionary Attacks
- Hybrid Attacks
- Online Attacks
- Brute Force
- Birthday Attack
- DoS, DDoS and DRDoS
- What is a Zero-day
- Social Engineering
-
- What is social engineering
- Scenarios
- Phishing
- Spear Phishing
- Lateral Phishing
- BEC Scams
- Smishing
- Vishing
- Tailgating
- Impersonation
- Dumpster Diving
- Shoulder Surfing
- Watering Hole
- Basic principles of social engineering
- An attack example
- The Social Engineering Attack Framework
- The PE Format
- DLLs
- Kernel Mode vs User Mode
- Protection Rings
- APIs
- Switching from User Mode to Kernel Mode
- How infection occurs
- Signatures
- Obfuscation & Mutation
- Polymorphic Malware
- Metamorphic Malware
- Mutation Engines
- Persistence
- System Registry
- DLL Hijacking
- DLL Load Order Hijacking
- Trojanized System Binaries
- Types of Malware
- Viruses
- Backdoors
- Adware
- Spyware
- Keyloggers
- Trojans
- RATs
- Cryptojacking
- Rootkits
- User mode
- Kernel mode
- IAT Hooking
- Bootkits
- Hybrid Malware
- Conficker
- Ransomware
- Stages of a Ransomware Attack
- WannaCry
- How to react
- Macro Viruses
- Scareware
- Fileless Malware
- Exploit Kits
- Angler
- Zeus Builder
- Crime as a Service
- Grand Crab
4. The SOC Specialist
- The SOC Specialist
- The Role and Responsibilities
- Preparation and Experience
5. IncidentResponse process
- Preparation
- Detection & Analysis
- Containment
- Eradication
- Recovery
- Post-Incident Activities
6. Network Diagnostics
- Tools for different ISO/OSI layers
- ARP scanning
- ICMP scanning
- Traceroute/tracepath
- Port probing
- Netcat
- Nslookup/dig
- Curl/wget
- Automatic detection of network objects and services
- Nmap
- Sweeping
7. The Packet Inspection
- Introduction
- Use case
- Tcpdump
- Tshark
- Introduction to Wireshark
- Filters utilization
8. The firewall opensource
- Linux Netfilter/Iptables
- Architecture
- Defense Model
- Rules
- Administration
- Old School
- firewalld
- ufw and other interfaces
- BSD pf
- Architecture
- Defense Model
- Rules
- Administration
9. Commercial firewalls and endpoint-protection
- Check Point Firewall
- Architettura
- Modello di difesa
- WebUI e Clish
- Smart console
- Gestione politiche di sicurezza
10. Gli IDS/IPS
- Snort
- Introduction
- Getting Started
- The Detection Engine and Rules
- Snort in pfSense
- Rule Management
- Alert and Log Management
- Tcpdump in pfSense
11. SIEMs
- IBM QRadar
- Introduction
- Architecture
- Event and Flow Collection
- Alert Management
- Rule Construction
- Use Case
Final certification

ADVANCED Course
Course objectives
The course trains personnel specialized in hunting cyber threats on a local network, identifying their presence and actions, thus enabling SOC specialists to evolve in their profession. This allows for more effective defense against current threats and prevention of future ones, thanks to an understanding of their behavior. The course develops skills in packet analysis techniques, tools, and procedures for hunting threats on TCP/IP networks. Investigation techniques will be introduced at different levels of the ISO/OSI stack to counter threats in all forms. The course culminates with an analysis of the network behavior of current real threats (malware).
Module 1: Threat research
- Introduction
- What is Threat Hunting
- Type of Strategy
- Tools
- Objectives
- Threat Hunting within the Incident Response process
- Threat Hunting and the Risk Management process
- The Phases of the Hunt
- Threat Intelligence and Forensic Analysis
- The Boundaries of the Hunt
- Intelligence Information: IoC
Module 2: Models and methods
- Reference Models
- Pyramid of Pain
- The Kill Chain and Countermeasures
- The Diamond Model
- How to Explore the Hunting Ground
- From Hypothesis to Report: The Hunting Process
- The Structure of a Report
Module 3: Network hunting
- From Intelligence to Infrastructure
- The Role of the Hunter
- The Origin of the Hunt: Anomalous Traffic
- Packet Inspection
- Live or Recorded
- Defense Strategies and Plans
- Defense Tools
- Investigation Points
- Ways to Intercept Network Traffic: Insertion Points
- Tools for Packet Inspection
- Libpcap and Derived Tools
- Tcpdump
- TShark
- An Agile Tool: Wireshark
- Using Filters
- User and Host Identification
- Exporting Pcap Streams
Module 4: Threat Hunting across the ISO/OSI Stack
- Detection of Attacks at the Physical Layer
- Anatomy of the ARP Protocol
- Exploitation of the ARP Protocol
- ARP Pinging
- ARP and Vendors
- Security Criteria and New Approaches
- Normal and Anomalous Traffic
- Detection of Attacks at the IP Layer
- Anatomy of the ICMP Protocol
- Exploitation of the ICMP Protocol
- Ping Sweep
- Malicious ICMP: Data Exfiltration
- Normal and Anomalous Traffic
- Detection of Attacks at the Transport Layer: TCP
- The TCP Protocol and the 3-Way Handshake
- Wireshark and TCP Counters
- Normal and Anomalous Traffic
- Specific Activities at the Transport Layer: Scanning
- Analyzing the activity of one of the most widespread scanning tools: Nmap
- Host Discovery
- Port Sweep
- Different Scanning Modes
- TCP SYN Scan / Stealth
- TCP Connect Scan
- FIN Scan
- NULL Scan
- XMAS Scan
- Detection of Attacks at the Transport Layer: UDP
- The UDP Protocol
- Normal and Anomalous Traffic
- Analyzing UDP Scanning Activity
- Detection of Attacks at the Application Layer
- The DHCP Protocol
- Anatomy of the DHCP Protocol
- Wireshark Specifics
- Normal and Anomalous Traffic
- The DNS Protocol
- Anatomy of the DNS Protocol
- Exploitation of the DNS Protocol
- Normal and Anomalous Traffic
- The HTTP Protocol
- Anatomy of the HTTP Protocol
- Normal and Anomalous Traffic
- Wireshark Tools Dedicated to the HTTP Protocol
- The Secure HTTPS Protocol
- Analyzing HTTPS
- Decrypting HTTPS
- The DHCP Protocol
- Analyzing the activity of one of the most widespread scanning tools: Nmap
Module 5: Analysis of supsicious flows
- Attack Detection via Flow Analysis
- Unknown Traffic
- Examination of Flows Linked to Known Malware
- Examining an Ursnif Infection
- Examining a Qakbot Infection
Final certification
BASIC course certifications
+

*CPSS certification is issued only if the requirements of the standard are met and after passing an official exam.
