
Log Analysis Secrets Every SOC Beginner Should Know
12/01/2026 | 1h 46 mins.
Learn how to pull, parse and pivot Windows Event Logs like a pro SOC analyst. Urvesh shows GUI, CLI and bootable-USB methods so you never miss evidenceāeven when Windows is broken. Perfect for blue-teamers, incident responders and anyone chasing their first cybersecurity roleTAKEAWAYSIdentify suspicious Event IDs (4624, 4625, 4688) in secondsBuild repeatable triage flow for ransomware, brute-force, insider threatsMap findings to MITRE ATT&CK for reports that impress hiring managers.00:00 ā 02:50 ā Introduction02:50 ā 03:48 - Learn SIEM tools (like Vasu, Splunk)03:48 ā 07:22 - Begin with Basics07:22 ā 08:20 - Windows Logs08:20 ā 01:23:05 - Window Logs09:47 ā What is Log10:35 ā Purpose12:47 ā Log Analysis14:00 - Event Viewer (First Step)16:04 ā Why Command Prompt 17:50 ā 3 Segments 18:16 ā Custom View19:01 ā Log Categorization24:13 ā Powershell26:39 ā Top 10 Interview question 32:19 ā Common Event IDs38:54 ā XML views 44:00 ā Warnings, Error44:11 ā Fundamental IDs49:21 ā Administrative Events 50:59 ā Create Custom view53:20 ā No SIEM tools 54:29 ā traditional Event IDās55:32 ā Sysmon (System Monitor)59:19 ā Enable Sysmon01:07:44 ā Sysmon IDs01:15:05 ā Is programming knowledge required01:16:51 ā Books 01:23:05 ā Hypothesis 01:24:55 ā Interviewer thought 01:32:01 ā Virus total 01:33:36 ā Scenario 2 (PowerShell command)01:35:38 ā Future broadcast (How to map one practical with minor attack)01:36:31 - schtasksSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#socanalyst #infosec #loginvestigation #SOC #LogAnalysis #WindowsEventLogs #Cybersecurity #IncidentResponse

CISO Data Handling During Recovery
08/01/2026 | 4 mins.
CISO Data Handling During Recovery

Network Security Foundation MASTER Class 2025
08/01/2026 | 33 mins.
Network Security Foundation Master Class: learn core networking types, media and devices every blue-team analyst must know. We break down PAN-LAN-WAN, analog vs digital transmission, wired vs wireless links, plus hub-switch-router-firewall roles. Finish with real-world media-selection metrics (bandwidth, latency, jitter) so you can spot risks and harden any network.WHAT YOUāLL LEARNScope-based network types: PAN, LAN, WLAN, CAN, MAN, WAN, GAN and SANAnalog vs digital transmissionāwhy noise and modulation matter for securityWired vs wireless media: coax, twisted pair, fiber, radio, microwave, infraredKey devices and their weak spots: hub, switch, router, modem, firewallPerformance metrics that expose risk: bandwidth, throughput, latency, jitter, BDPHow Zero-Trust principles map onto modern multi-site SD-WAN designsNetwork Security https://www.youtube.com/watch?v=Y3ozkAFuiHc&list=PL0hT6hgexlYzX6AWwcyDbAZQUKYJL2Mdt&pp=gAQBSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#networksecurity #computernetworking #infosec #socanalyst #computernetworking #itnetworking

SOC Career Secrets Exposed You Won't Believe What We're Sharing
07/01/2026 | 1h 13 mins.
In this podcast, cybersecurity mentor Prabh Nair sits down with Urvesh, a skilled cybersecurity professional, to break down everything you need to know to land a SOC Analyst job ā from foundational skills to automation, interview strategies, resume tips, and mindset shifts.https://www.linkedin.com/in/urvesh-thakkar/?originalSubdomain=inWhether youāre a beginner in cybersecurity or preparing for your first SOC role, this episode offers practical advice, real-world insights, and a step-by-step roadmap to kickstart your career.š What Youāll Learn:āļø Bug bounty vs SOC: What worked and what didnātāļø Free ways to learn cybersecurity (and what to avoid paying for)āļø How to build your home lab for SOC/SIEM practiceāļø Real tips for building a job-winning cybersecurity resumeāļø How to prep for SOC Analyst interviews (mindset + skills)āļø Why fundamentals beat certifications ā every timeāļø How to automate phishing detection with Python and scriptsāļø The exact number of hours to invest to reach SOC readinessāļø Strategies to stand out on LinkedIn + direct outreach tacticsš¼ Best For:SOC Analyst Aspirants (L1, L2, L3)Cybersecurity BeginnersFreshers with no IT backgroundBCA/BTech/BA grads starting in InfosecAnyone looking to transition into Blue Team rolesCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvSOC Playlisthttps://youtube.com/playlist?list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAc&si=xA1CmEPZ_eb93OcWStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#SOCAnalyst #CyberSecurityCareers #SOCMasterClass #CyberSecurityForBeginners #ThreatDetection #SIEM #SOCTraining #NetworkingBasics #CyberDefense #CyberSecurityTips #socjobs #socanalyst

What SOC Analysts REALLY Need to Learn FIRST in 2025
06/01/2026 | 32 mins.
This video is your complete āSOC Analyst Roadmapā for 2025. I break down every skill, tool, and mindset you need ā in the exact order that hiring managers expect. No fluff, no random tutorials, just a proven learning sequence that gets interviews.00:00 ā 00:53 ā Introduction00:53 ā 01:43 - Sequence01:43 ā 02:07 - Reading of Logs02:07 ā 02:16 - Identify the common attacks02:16 ā 02:35 - SIEM 02:35 ā 03:45 - Computer Fundamentals03:35 ā 04:10 ā DATA04:10 ā 04:33 - Operating Systems04:33 ā 05:08 - Basic Linux Commands05:08 ā 06:10 - IP Address (Identifying common attacks)06:10 ā 06:49 - Internet protocols06:49 ā 07:21 - Tools07:21 - 09:35 - Network Devices (Packet Movements)09:35 ā 10:45 - Secure Internet Traffic 10:45 ā 14:18 - Cyber Security14:18 ā 16:40 - SOC structure and roles16:40 ā 17:36 ā Logs17:36 ā 21:33 - (Reading Logs)21:33 ā 24:27 - Packet Investigation24:27 ā 27:13 - Common Attacks27:13 ā 31:10 - SIEMWHY WATCH THIS SOC LEARNING GUIDE?Clear structure ā Networking ā Cybersecurity basics ā SOC workflow ā Log analysis ā Wireshark ā Attack footprints ā Free SIEM labs.Beginner-friendly ā Perfect if you keep asking āHow do I start in cybersecurity?āReal SOC stories ā Learn from my first panic-filled log incident and how it shaped my Blue Team career.Actionable resources ā Download links for cheat sheets, practice labs, and sample logsDFIRhttps://github.com/Azr43lKn1ght/DFIR-LABSWHAT YOUāLL MASTERNetworking Fundamentals: IP addresses, ports, protocols, traceroute ā the bedrock of incident detection.Cybersecurity Foundations: CIA triad, threat-vulnerability-risk logic, real-world attack impact.SOC Structure & Roles: L1 vs L2 vs L3 responsibilities, escalation flow, ticket lifecycle.Log Analysis: Windows Event ID 4625, Linux auth.log, firewall deny entries ā find Indicators of Compromise fast.Wireshark Deep Dive: Follow TCP streams, spot DNS tunneling, detect C2 beaconing.Common Attack Patterns: Phishing, brute-force, malware, lateral movement ā mapped to MITRE ATT&CK.Hands-On SIEM: Splunk Free & Wazuh ā ingest sample logs, run correlation searches, build your first alert.#socanalyst #SOCTraining #CyberSecurityCareers #BlueTeam #LogAnalysis #Wireshark #SIEM #Splunk #Wazuh #NetworkingBasics #MITREATTACK #SOCRoadmap #InfosecJobsSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE



Prabh Nair