
Log Analysis Secrets Every SOC Beginner Should Know
12/01/2026 | 1h 46 mins.
Learn how to pull, parse and pivot Windows Event Logs like a pro SOC analyst. Urvesh shows GUI, CLI and bootable-USB methods so you never miss evidence—even when Windows is broken. Perfect for blue-teamers, incident responders and anyone chasing their first cybersecurity roleTAKEAWAYSIdentify suspicious Event IDs (4624, 4625, 4688) in secondsBuild repeatable triage flow for ransomware, brute-force, insider threatsMap findings to MITRE ATT&CK for reports that impress hiring managers.00:00 – 02:50 – Introduction02:50 – 03:48 - Learn SIEM tools (like Vasu, Splunk)03:48 – 07:22 - Begin with Basics07:22 – 08:20 - Windows Logs08:20 – 01:23:05 - Window Logs09:47 – What is Log10:35 – Purpose12:47 – Log Analysis14:00 - Event Viewer (First Step)16:04 – Why Command Prompt 17:50 – 3 Segments 18:16 – Custom View19:01 – Log Categorization24:13 – Powershell26:39 – Top 10 Interview question 32:19 – Common Event IDs38:54 – XML views 44:00 – Warnings, Error44:11 – Fundamental IDs49:21 – Administrative Events 50:59 – Create Custom view53:20 – No SIEM tools 54:29 – traditional Event ID’s55:32 – Sysmon (System Monitor)59:19 – Enable Sysmon01:07:44 – Sysmon IDs01:15:05 – Is programming knowledge required01:16:51 – Books 01:23:05 – Hypothesis 01:24:55 – Interviewer thought 01:32:01 – Virus total 01:33:36 – Scenario 2 (PowerShell command)01:35:38 – Future broadcast (How to map one practical with minor attack)01:36:31 - schtasksSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#socanalyst #infosec #loginvestigation #SOC #LogAnalysis #WindowsEventLogs #Cybersecurity #IncidentResponse

CISO Data Handling During Recovery
08/01/2026 | 4 mins.
CISO Data Handling During Recovery

Network Security Foundation MASTER Class 2025
08/01/2026 | 33 mins.
Network Security Foundation Master Class: learn core networking types, media and devices every blue-team analyst must know. We break down PAN-LAN-WAN, analog vs digital transmission, wired vs wireless links, plus hub-switch-router-firewall roles. Finish with real-world media-selection metrics (bandwidth, latency, jitter) so you can spot risks and harden any network.WHAT YOU’LL LEARNScope-based network types: PAN, LAN, WLAN, CAN, MAN, WAN, GAN and SANAnalog vs digital transmission—why noise and modulation matter for securityWired vs wireless media: coax, twisted pair, fiber, radio, microwave, infraredKey devices and their weak spots: hub, switch, router, modem, firewallPerformance metrics that expose risk: bandwidth, throughput, latency, jitter, BDPHow Zero-Trust principles map onto modern multi-site SD-WAN designsNetwork Security https://www.youtube.com/watch?v=Y3ozkAFuiHc&list=PL0hT6hgexlYzX6AWwcyDbAZQUKYJL2Mdt&pp=gAQBSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#networksecurity #computernetworking #infosec #socanalyst #computernetworking #itnetworking

SOC Career Secrets Exposed You Won't Believe What We're Sharing
07/01/2026 | 1h 13 mins.
In this podcast, cybersecurity mentor Prabh Nair sits down with Urvesh, a skilled cybersecurity professional, to break down everything you need to know to land a SOC Analyst job — from foundational skills to automation, interview strategies, resume tips, and mindset shifts.https://www.linkedin.com/in/urvesh-thakkar/?originalSubdomain=inWhether you’re a beginner in cybersecurity or preparing for your first SOC role, this episode offers practical advice, real-world insights, and a step-by-step roadmap to kickstart your career.🔍 What You’ll Learn:✔️ Bug bounty vs SOC: What worked and what didn’t✔️ Free ways to learn cybersecurity (and what to avoid paying for)✔️ How to build your home lab for SOC/SIEM practice✔️ Real tips for building a job-winning cybersecurity resume✔️ How to prep for SOC Analyst interviews (mindset + skills)✔️ Why fundamentals beat certifications — every time✔️ How to automate phishing detection with Python and scripts✔️ The exact number of hours to invest to reach SOC readiness✔️ Strategies to stand out on LinkedIn + direct outreach tactics💼 Best For:SOC Analyst Aspirants (L1, L2, L3)Cybersecurity BeginnersFreshers with no IT backgroundBCA/BTech/BA grads starting in InfosecAnyone looking to transition into Blue Team rolesCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvSOC Playlisthttps://youtube.com/playlist?list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAc&si=xA1CmEPZ_eb93OcWStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#SOCAnalyst #CyberSecurityCareers #SOCMasterClass #CyberSecurityForBeginners #ThreatDetection #SIEM #SOCTraining #NetworkingBasics #CyberDefense #CyberSecurityTips #socjobs #socanalyst

What SOC Analysts REALLY Need to Learn FIRST in 2025
06/01/2026 | 32 mins.
This video is your complete “SOC Analyst Roadmap” for 2025. I break down every skill, tool, and mindset you need – in the exact order that hiring managers expect. No fluff, no random tutorials, just a proven learning sequence that gets interviews.00:00 – 00:53 – Introduction00:53 – 01:43 - Sequence01:43 – 02:07 - Reading of Logs02:07 – 02:16 - Identify the common attacks02:16 – 02:35 - SIEM 02:35 – 03:45 - Computer Fundamentals03:35 – 04:10 – DATA04:10 – 04:33 - Operating Systems04:33 – 05:08 - Basic Linux Commands05:08 – 06:10 - IP Address (Identifying common attacks)06:10 – 06:49 - Internet protocols06:49 – 07:21 - Tools07:21 - 09:35 - Network Devices (Packet Movements)09:35 – 10:45 - Secure Internet Traffic 10:45 – 14:18 - Cyber Security14:18 – 16:40 - SOC structure and roles16:40 – 17:36 – Logs17:36 – 21:33 - (Reading Logs)21:33 – 24:27 - Packet Investigation24:27 – 27:13 - Common Attacks27:13 – 31:10 - SIEMWHY WATCH THIS SOC LEARNING GUIDE?Clear structure – Networking ➜ Cybersecurity basics ➜ SOC workflow ➜ Log analysis ➜ Wireshark ➜ Attack footprints ➜ Free SIEM labs.Beginner-friendly – Perfect if you keep asking “How do I start in cybersecurity?”Real SOC stories – Learn from my first panic-filled log incident and how it shaped my Blue Team career.Actionable resources – Download links for cheat sheets, practice labs, and sample logsDFIRhttps://github.com/Azr43lKn1ght/DFIR-LABSWHAT YOU’LL MASTERNetworking Fundamentals: IP addresses, ports, protocols, traceroute – the bedrock of incident detection.Cybersecurity Foundations: CIA triad, threat-vulnerability-risk logic, real-world attack impact.SOC Structure & Roles: L1 vs L2 vs L3 responsibilities, escalation flow, ticket lifecycle.Log Analysis: Windows Event ID 4625, Linux auth.log, firewall deny entries – find Indicators of Compromise fast.Wireshark Deep Dive: Follow TCP streams, spot DNS tunneling, detect C2 beaconing.Common Attack Patterns: Phishing, brute-force, malware, lateral movement – mapped to MITRE ATT&CK.Hands-On SIEM: Splunk Free & Wazuh – ingest sample logs, run correlation searches, build your first alert.#socanalyst #SOCTraining #CyberSecurityCareers #BlueTeam #LogAnalysis #Wireshark #SIEM #Splunk #Wazuh #NetworkingBasics #MITREATTACK #SOCRoadmap #InfosecJobsSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE



Prabh Nair