For SOC analysts, detection engineers, and security operations managers in M365 environments
Security Operations Center (SOC) Operations
Build a production SOC capability from detection to documentation.
13 modules that take you from detection engineering methodology through 28 production KQL rules, investigation playbooks, incident response reporting, hardening baselines, automation, and threat intelligence operations. Every module produces deployable assets — not theory you shelve.
Overview
SOC Operations is a complete learning course that builds a production SOC capability module by module. You start with the organisational framework — operating models, analyst tiers, escalation paths, and the SOC charter. Then you build detection rules across four M365 domains, investigation playbooks for the most common attack scenarios, incident response documentation templates, hardening baselines, automation workflows, operational metrics, and a threat intelligence programme.
Every module produces deployable assets: KQL detection rules you can paste into Sentinel, playbooks your team can follow during live incidents, report templates your CISO can read, and hardening checklists you can work through this week.
Audience profile
SOC analysts and detection engineers working in Microsoft 365 environments who want structured methodology, production KQL queries, and tested operational workflows they can deploy immediately.
Security operations managers building or maturing a SOC team — the course provides the complete organisational framework alongside the technical assets.
IT professionals transitioning into SOC roles who have completed M365 Security Operations and want to build the operational infrastructure for their SOC.
This course assumes working knowledge of Microsoft Sentinel, KQL, and M365 security concepts. If you need that foundation first, start with M365 Security Operations.
Course syllabus
13 modules across four phases. Every module produces operational assets you deploy to your environment.
Phase 1 — Foundation (Modules 0–2): SOC operating models, analyst tiers, detection engineering methodology, MITRE ATT&CK coverage mapping, and the SOC charter.
Phase 2 — Detection Libraries (28 rules): Production KQL detection rules across identity, email, endpoint, and cloud domains. Each rule includes full specification, annotated KQL, false positive analysis, and response actions.
Phase 3 — Investigation & Response (Modules 7–8): Three complete investigation playbooks (AiTM, BEC, ransomware) with binary decision trees, plus four IR report templates for every audience from the SOC team to the board.
Phase 4 — Operational Maturity (Modules 9–12): 45 hardening controls with validation queries, five automation playbook templates, SOC metrics dashboards, and a threat intelligence operations programme.
Total: 167,000+ words of operational content. 28 detection rules. 3 playbooks. 4 IR templates. 45 hardening controls. 5 automation templates.
Course modules
13 modules across four phases. Every module produces operational assets you deploy to your environment.
How to approach this course
Recommended path
Work through the phases in order. Phase 1 (SOC Foundations + Detection Engineering) provides the organisational and methodological framework that everything else builds on. Phase 2 (Detection Rules) gives you production KQL. Phase 3 (Playbooks + Reports) operationalises the detections. Phase 4 (Hardening, Automation, Metrics, TI) matures the capability.
If you already run a SOC and want specific assets, jump directly to the modules you need — each module is self-contained with all the context required.
How it connects to M365 Security Operations
SOC Operations builds on the investigation skills taught in M365 Security Operations. The M365 course teaches you how to investigate incidents. This course gives you the operational infrastructure to run a SOC — detection rules, playbooks, documentation, hardening, automation, and metrics.
Take M365 Security Operations to build the skills. Take SOC Operations to build the infrastructure. Take both to build a complete SOC capability.
See for yourself
Available with a paid subscription. Start with M365 Security Operations if you need the investigation foundation first, or dive straight into SOC Operations if you already have the skills and need the infrastructure.