Skip to content

ROADMAP SOC - AN TOÀN THÔNG TIN TOÀN DIỆN¤

1. FOUNDATIONS - NỀN TẢNG CƠ BẢN¤

1.1 Kiến thức nền tảng IT¤

  • Cách hoạt động của máy tính (CPU, RAM, Storage)
  • Hệ điều hành cơ bản (Windows, Linux, macOS)
  • Networking basics (TCP/IP, OSI model)
  • Lịch sử và tầm quan trọng của cybersecurity
  • Các loại tấn công phổ biến overview

1.2 Linux Fundamentals¤

  • Cài đặt và sử dụng Linux (Ubuntu, Kali, CentOS)
  • Command line basics (ls, cd, chmod, grep, find)
  • File system hierarchy
  • User và permission management
  • Process management (ps, top, kill)
  • Package management (apt, yum, dnf)
  • Text editors (vim, nano)
  • Shell scripting basics
  • Log files và system monitoring

1.3 Windows Security Basics¤

  • Windows architecture
  • Active Directory cơ bản
  • User và Group management
  • Group Policy
  • Windows Registry
  • Event Viewer
  • PowerShell basics
  • Windows Security features (Defender, Firewall)

1.4 Networking Fundamentals¤

  • OSI Model (7 layers)
  • TCP/IP Model
  • IP Addressing (IPv4, IPv6)
  • Subnetting và CIDR
  • MAC addresses
  • Ports và protocols (HTTP, HTTPS, FTP, SSH, DNS, DHCP)
  • Routing và switching basics
  • VLANs
  • Network topologies

2. NETWORKING DEEP DIVE¤

2.1 Network Protocols¤

  • TCP vs UDP
  • HTTP/HTTPS/HTTP2/HTTP3
  • DNS (Domain Name System)
  • DHCP (Dynamic Host Configuration Protocol)
  • ARP (Address Resolution Protocol)
  • ICMP (ping, traceroute)
  • SMTP, POP3, IMAP
  • FTP, SFTP, FTPS
  • SSH, Telnet
  • SNMP
  • NTP

2.2 Network Devices¤

  • Routers
  • Switches (L2, L3)
  • Firewalls
  • Load balancers
  • Proxies (forward, reverse)
  • IDS/IPS
  • WAF (Web Application Firewall)
  • VPN gateways

2.3 Network Security¤

  • Firewall rules và policies
  • Network segmentation
  • DMZ (Demilitarized Zone)
  • VPN (Site-to-Site, Remote Access)
  • VPN protocols (IPSec, SSL/TLS, OpenVPN, WireGuard)
  • Network Access Control (NAC)
  • Port security
  • VLAN security
  • Wireless security (WPA2, WPA3)

2.4 Network Monitoring¤

  • Packet capture (Wireshark, tcpdump)
  • NetFlow/sFlow
  • Network traffic analysis
  • Bandwidth monitoring
  • SNMP monitoring

3. SECURITY FUNDAMENTALS¤

3.1 CIA Triad¤

  • Confidentiality (Bảo mật)
  • Integrity (Toàn vẹn)
  • Availability (Khả dụng)
  • Authentication (Xác thực)
  • Authorization (Phân quyền)
  • Non-repudiation (Không thể chối bỏ)

3.2 Cryptography¤

  • Symmetric encryption (AES, DES, 3DES)
  • Asymmetric encryption (RSA, ECC)
  • Hashing (MD5, SHA-1, SHA-256, SHA-512)
  • Digital signatures
  • Certificates và PKI (Public Key Infrastructure)
  • SSL/TLS
  • PGP/GPG
  • Key management
  • Cryptographic protocols

3.3 Authentication & Authorization¤

  • Password security và best practices
  • Multi-factor authentication (MFA)
  • Single Sign-On (SSO)
  • OAuth 2.0
  • SAML
  • OpenID Connect
  • Kerberos
  • LDAP
  • RADIUS/TACACS+
  • Biometric authentication

3.4 Access Control Models¤

  • DAC (Discretionary Access Control)
  • MAC (Mandatory Access Control)
  • RBAC (Role-Based Access Control)
  • ABAC (Attribute-Based Access Control)
  • Rule-based access control
  • Least privilege principle
  • Separation of duties

4. THREAT LANDSCAPE - PHONG CẢNH MÃI HIỂM¤

4.1 Threat Actors¤

  • Script kiddies
  • Hacktivists
  • Organized crime
  • Nation-state actors
  • Insider threats
  • Advanced Persistent Threats (APT)

4.2 Attack Vectors¤

  • Phishing và spear phishing
  • Malware (viruses, worms, trojans)
  • Ransomware
  • Spyware và adware
  • Rootkits
  • Botnets
  • Zero-day exploits
  • SQL injection
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • DDoS attacks
  • Man-in-the-middle (MITM)
  • Social engineering
  • Supply chain attacks

4.3 Vulnerability Types¤

  • Buffer overflows
  • Race conditions
  • Privilege escalation
  • Authentication bypasses
  • Information disclosure
  • Injection flaws
  • Broken access control
  • Security misconfigurations
  • Using components with known vulnerabilities

4.4 Malware Analysis Basics¤

  • Static analysis
  • Dynamic analysis
  • Sandboxing
  • Malware families
  • Indicators of Compromise (IOCs)
  • File hashing
  • YARA rules

5. SOC OPERATIONS - VẬN HÀNH SOC¤

5.1 SOC Structure¤

  • SOC roles và responsibilities
  • Tier 1 Analyst (Alert triage)
  • Tier 2 Analyst (Incident investigation)
  • Tier 3 Analyst (Threat hunting)
  • SOC Manager
  • Incident Response team
  • Threat Intelligence team
  • SOC workflows
  • Shift operations
  • On-call procedures

5.2 Security Monitoring¤

  • Log collection và aggregation
  • Event correlation
  • Baseline behavior
  • Anomaly detection
  • Alert generation
  • Alert prioritization
  • False positive reduction
  • Security dashboards
  • Metrics và KPIs

5.3 Alert Triage¤

  • Alert classification
  • Initial analysis
  • Context gathering
  • Severity assessment
  • Escalation criteria
  • Documentation requirements
  • Communication protocols

5.4 Incident Response¤

  • Incident Response lifecycle
  • Preparation
  • Detection và Analysis
  • Containment
  • Eradication
  • Recovery
  • Post-incident activity
  • Lessons learned
  • Incident documentation
  • Chain of custody
  • Evidence preservation

5.5 Threat Hunting¤

  • Hypothesis-driven hunting
  • Intelligence-driven hunting
  • Situational awareness hunting
  • Hunting methodologies
  • MITRE ATT&CK framework
  • Hunting tools và techniques
  • IOC hunting
  • Behavioral hunting

6. SIEM & LOG MANAGEMENT¤

6.1 SIEM Concepts¤

  • Log sources
  • Log normalization
  • Event correlation
  • Use cases
  • Alert rules
  • Dashboards và reports
  • Log retention policies
  • Compliance requirements
  • Splunk
  • IBM QRadar
  • ArcSight
  • LogRhythm
  • Elastic Stack (ELK)
  • Graylog
  • AlienVault OSSIM
  • Microsoft Sentinel (Azure Sentinel)
  • Google Chronicle
  • Sumo Logic

6.3 Log Analysis¤

  • Log parsing
  • Regular expressions
  • Search queries (SPL for Splunk, KQL for Sentinel)
  • Statistical analysis
  • Trend analysis
  • Pattern recognition
  • Anomaly detection
  • Time-series analysis

6.4 Common Log Sources¤

  • Windows Event Logs
  • Linux Syslog
  • Firewall logs
  • IDS/IPS logs
  • Proxy logs
  • Web server logs (Apache, Nginx, IIS)
  • Application logs
  • Database logs
  • VPN logs
  • DNS logs
  • Cloud service logs

7. SECURITY TOOLS & TECHNOLOGIES¤

7.1 Endpoint Security¤

  • Antivirus/Anti-malware
  • EDR (Endpoint Detection and Response)
  • XDR (Extended Detection and Response)
  • Host-based IDS/IPS
  • Application whitelisting
  • Patch management
  • DLP (Data Loss Prevention)
  • Mobile Device Management (MDM)

7.2 Network Security Tools¤

  • Firewalls (Palo Alto, Fortinet, Cisco ASA, pfSense)
  • IDS/IPS (Snort, Suricata, Zeek/Bro)
  • Network scanners (Nmap, Masscan)
  • Vulnerability scanners (Nessus, OpenVAS, Qualys)
  • Packet analyzers (Wireshark, tcpdump)
  • NetFlow analyzers

7.3 Vulnerability Management¤

  • Vulnerability scanning
  • Vulnerability assessment
  • Vulnerability prioritization (CVSS scoring)
  • Patch management
  • Configuration management
  • Asset inventory
  • Remediation tracking
  • Compliance scanning

7.4 Threat Intelligence Platforms¤

  • MISP (Malware Information Sharing Platform)
  • ThreatConnect
  • Anomali
  • Recorded Future
  • ThreatQuotient
  • IOC feeds
  • STIX/TAXII
  • OSINT sources

7.5 Security Orchestration (SOAR)¤

  • Playbook automation
  • Case management
  • Threat intelligence integration
  • Automated response actions
  • Workflow orchestration
  • Popular platforms (Splunk SOAR, Palo Alto Cortex XSOAR)

8. THREAT INTELLIGENCE¤

8.1 Intelligence Types¤

  • Strategic intelligence
  • Tactical intelligence
  • Operational intelligence
  • Technical intelligence

8.2 Intelligence Sources¤

  • OSINT (Open Source Intelligence)
  • Commercial feeds
  • Information Sharing communities (ISACs)
  • Dark web monitoring
  • Honeypots
  • Internal telemetry

8.3 Threat Intelligence Lifecycle¤

  • Planning và direction
  • Collection
  • Processing
  • Analysis
  • Dissemination
  • Feedback

8.4 IOC Management¤

  • IOC types (IPs, domains, hashes, URLs)
  • IOC enrichment
  • IOC aging
  • False positive handling
  • Threat actor profiling
  • Campaign tracking

8.5 Frameworks¤

  • MITRE ATT&CK
  • Cyber Kill Chain
  • Diamond Model
  • STIX/TAXII
  • OpenIOC

9. COMPLIANCE & GOVERNANCE¤

9.1 Security Frameworks¤

  • NIST Cybersecurity Framework
  • ISO 27001/27002
  • CIS Controls
  • PCI DSS
  • HIPAA
  • SOC 2
  • GDPR
  • COBIT
  • ITIL

9.2 Compliance Monitoring¤

  • Policy enforcement
  • Audit logging
  • Compliance reporting
  • Control validation
  • Gap analysis
  • Risk assessment
  • Remediation tracking

9.3 Security Policies¤

  • Acceptable Use Policy
  • Password Policy
  • Incident Response Policy
  • Data Classification Policy
  • Access Control Policy
  • Change Management Policy
  • Business Continuity Policy
  • Disaster Recovery Policy

10. CLOUD SECURITY¤

10.1 Cloud Platforms¤

  • AWS security services
  • Azure security services
  • GCP security services
  • Cloud security architecture
  • Shared responsibility model

10.2 Cloud Security Monitoring¤

  • CloudTrail (AWS)
  • Azure Monitor
  • GCP Cloud Logging
  • Cloud SIEM solutions
  • CSPM (Cloud Security Posture Management)
  • CWPP (Cloud Workload Protection Platform)

10.3 Cloud-Specific Threats¤

  • Misconfiguration
  • Insecure APIs
  • Account hijacking
  • Data breaches
  • Insider threats
  • Shared technology vulnerabilities

10.4 Container Security¤

  • Docker security
  • Kubernetes security
  • Container scanning
  • Runtime protection
  • Image signing
  • Registry security

11. INCIDENT RESPONSE ADVANCED¤

11.1 Digital Forensics¤

  • Forensic process
  • Evidence acquisition
  • Disk imaging
  • Memory forensics
  • Network forensics
  • Mobile forensics
  • Cloud forensics
  • Forensic tools (FTK, EnCase, Autopsy, Volatility)
  • Timeline analysis
  • Artifact analysis

11.2 Malware Analysis¤

  • Static analysis tools (IDA Pro, Ghidra)
  • Dynamic analysis (Cuckoo Sandbox, Any.run)
  • Reverse engineering
  • Behavioral analysis
  • Code analysis
  • Indicators extraction
  • Report writing

11.3 Threat Emulation¤

  • Red team vs Blue team
  • Purple team exercises
  • Penetration testing basics
  • Attack simulation
  • Breach and attack simulation (BAS)
  • Adversary emulation

12. SCRIPTING & AUTOMATION¤

12.1 Python for Security¤

  • Python basics
  • Libraries: requests, scapy, beautifulsoup
  • API interaction
  • Log parsing scripts
  • Automation scripts
  • SIEM API integration
  • IOC enrichment scripts
  • Report generation

12.2 PowerShell¤

  • PowerShell basics
  • Active Directory querying
  • Windows log analysis
  • Automation scripts
  • Security hardening scripts
  • Incident response scripts

12.3 Bash Scripting¤

  • Bash basics
  • Log parsing
  • Automation tasks
  • Security monitoring scripts
  • Incident response automation

12.4 APIs & Integration¤

  • REST APIs
  • GraphQL
  • SIEM APIs
  • Threat intelligence APIs
  • Ticketing system APIs
  • Webhook integration

13. NETWORK TRAFFIC ANALYSIS¤

13.1 Packet Analysis¤

  • Wireshark mastery
  • Protocol analysis
  • Traffic patterns
  • Malicious traffic identification
  • Encrypted traffic analysis
  • Display filters
  • Capture filters

13.2 NetFlow Analysis¤

  • NetFlow basics
  • Traffic baselining
  • Anomaly detection
  • Data exfiltration detection
  • C2 communication detection

13.3 Common Attack Patterns¤

  • Port scanning signatures
  • DDoS patterns
  • SQL injection in network traffic
  • Malware C2 beaconing
  • Data exfiltration patterns
  • Lateral movement indicators

14. EMAIL SECURITY¤

14.1 Email Threats¤

  • Phishing
  • Spear phishing
  • Business Email Compromise (BEC)
  • Email spoofing
  • Malicious attachments
  • Malicious links

14.2 Email Security Technologies¤

  • SPF (Sender Policy Framework)
  • DKIM (DomainKeys Identified Mail)
  • DMARC (Domain-based Message Authentication)
  • Email gateways
  • Sandboxing
  • URL rewriting
  • Attachment scanning

14.3 Email Analysis¤

  • Header analysis
  • Link analysis
  • Attachment analysis
  • Domain reputation checking
  • Phishing indicators
  • Reporting mechanisms

15. WEB APPLICATION SECURITY¤

15.1 OWASP Top 10¤

  • Injection flaws
  • Broken authentication
  • Sensitive data exposure
  • XML External Entities (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-Site Scripting (XSS)
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging và monitoring

15.2 Web Security Testing¤

  • Burp Suite
  • OWASP ZAP
  • SQL injection testing
  • XSS testing
  • CSRF testing
  • Authentication testing
  • Session management testing

15.3 WAF (Web Application Firewall)¤

  • WAF concepts
  • Rule management
  • False positive tuning
  • Virtual patching
  • Popular WAFs (ModSecurity, Cloudflare, AWS WAF)

16. IDENTITY & ACCESS MANAGEMENT (IAM)¤

16.1 Identity Management¤

  • User lifecycle management
  • Provisioning/De-provisioning
  • Identity federation
  • Directory services
  • Identity governance

16.2 Access Management¤

  • Privileged Access Management (PAM)
  • Just-in-Time (JIT) access
  • Temporary elevated access
  • Access reviews
  • Segregation of duties

16.3 Monitoring IAM¤

  • Authentication logs
  • Failed login attempts
  • Privilege escalation detection
  • Unusual access patterns
  • Account compromise indicators

17. SECURITY METRICS & KPIs¤

17.1 SOC Metrics¤

  • Mean Time to Detect (MTTD)
  • Mean Time to Respond (MTTR)
  • Mean Time to Contain (MTTC)
  • Number of incidents
  • False positive rate
  • Alert volume
  • Escalation rate
  • SLA compliance

17.2 Security Posture Metrics¤

  • Vulnerability counts
  • Patch compliance
  • Configuration compliance
  • Risk scores
  • Security control effectiveness

17.3 Reporting¤

  • Executive dashboards
  • Incident reports
  • Trend analysis reports
  • Compliance reports
  • Threat intelligence reports
  • Monthly/quarterly security reviews

18. ADVANCED TOPICS¤

18.1 Machine Learning in Security¤

  • Anomaly detection
  • Behavioral analysis
  • Predictive analytics
  • ML-based UEBA (User and Entity Behavior Analytics)
  • False positive reduction
  • Threat classification

18.2 Deception Technology¤

  • Honeypots
  • Honeynets
  • Decoy systems
  • Breadcrumbs
  • Early warning systems

18.3 Zero Trust Architecture¤

  • Zero trust principles
  • Micro-segmentation
  • Continuous verification
  • Least privilege access
  • Device trust
  • Network zero trust

18.4 DevSecOps¤

  • Security trong CI/CD pipeline
  • SAST (Static Application Security Testing)
  • DAST (Dynamic Application Security Testing)
  • Container security scanning
  • Infrastructure as Code (IaC) security
  • Secret management

19. SOFT SKILLS & COMMUNICATION¤

19.1 Communication Skills¤

  • Technical writing
  • Incident reporting
  • Stakeholder communication
  • Presentation skills
  • Documentation
  • Email etiquette

19.2 Analytical Skills¤

  • Critical thinking
  • Problem-solving
  • Pattern recognition
  • Root cause analysis
  • Decision making under pressure

19.3 Collaboration¤

  • Team coordination
  • Cross-functional collaboration
  • Escalation management
  • Knowledge sharing
  • Mentoring

19.4 Stress Management¤

  • Handling high-pressure situations
  • Shift work management
  • Burnout prevention
  • Continuous learning mindset

20. CERTIFICATIONS¤

20.1 Entry Level¤

  • CompTIA Security+
  • CompTIA Network+
  • CompTIA CySA+ (Cybersecurity Analyst)
  • Cisco CCNA Security
  • (ISC)² Security CC

20.2 Intermediate¤

  • CEH (Certified Ethical Hacker)
  • GIAC Security Essentials (GSEC)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Continuous Monitoring Certification (GMON)
  • Splunk Core Certified User/Power User

20.3 Advanced¤

  • CISSP (Certified Information Systems Security Professional)
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Intrusion Analyst (GCIA)
  • OSCP (Offensive Security Certified Professional)
  • CREST certifications

20.4 Specialized¤

  • Cloud certifications (AWS Security, Azure Security Engineer)
  • Vendor-specific (Palo Alto PCNSE, Fortinet NSE)
  • SANS GIAC family
  • CISA (Certified Information Systems Auditor)

21. HANDS-ON LABS & PRACTICE¤

21.1 Lab Environments¤

  • Home lab setup (VirtualBox, VMware)
  • Cloud labs (AWS, Azure free tier)
  • Online platforms (TryHackMe, HackTheBox)
  • Cyber ranges
  • CTF competitions

21.2 Practice Scenarios¤

  • Log analysis exercises
  • Incident response simulations
  • Malware analysis labs
  • Network traffic analysis
  • SIEM use case development
  • Threat hunting exercises

21.3 Resources¤

  • Security blogs
  • Podcasts
  • YouTube channels
  • GitHub repositories
  • Security conferences (DEF CON, Black Hat, RSA)
  • Online courses (Cybrary, Udemy, Pluralsight)

22. CAREER PATH¤

22.1 Entry Points¤

  • SOC Analyst Tier 1
  • Security Operations Center Analyst
  • Cyber Security Analyst
  • Information Security Analyst

22.2 Mid-Level Positions¤

  • SOC Analyst Tier ⅔
  • Incident Responder
  • Threat Hunter
  • Security Engineer
  • SIEM Engineer

22.3 Senior Positions¤

  • SOC Manager
  • Security Architect
  • Threat Intelligence Analyst
  • Incident Response Manager
  • CISO (Chief Information Security Officer)

22.4 Specializations¤

  • Malware Analyst
  • Forensics Analyst
  • Penetration Tester (crossover)
  • Threat Intelligence Analyst
  • Cloud Security Specialist
  • Security Automation Engineer

LỘ TRÌNH HỌC ĐỀ XUẤT¤

Tháng 1-2: Foundations (Linux, Windows, Networking basics) Tháng 3-4: Networking Deep Dive, Security Fundamentals Tháng 5-6: Threat Landscape, SOC Operations basics Tháng 7-8: SIEM & Log Management, Security Tools Tháng 9-10: Threat Intelligence, Compliance Tháng 11-12: Cloud Security, Incident Response Tháng 13-15: Scripting, Advanced Topics Tháng 16-18: Specialized areas, Certifications prep Ongoing: Hands-on labs, CTFs, Real-world practice

TIPS ĐỂ THÀNH CÔNG¤

  • Thực hành hàng ngày với labs
  • Đọc threat intelligence reports thường xuyên
  • Follow security news và blogs
  • Tham gia CTF competitions
  • Build home lab
  • Document mọi thứ học được
  • Join security communities
  • Contribute to open source security projects
  • Stay updated với latest threats
  • Practice incident response scenarios
  • Learn from real-world breaches
  • Network với security professionals

Chúc bạn thành công trên con đường trở thành SOC Analyst!