0.5 Check My Knowledge

45 minutes · Module 0 · Free

Check My Knowledge

1. You are a security operations manager who has just been given budget to "build a SOC." You have 2 analysts, a Sentinel workspace, and 6 months. Based on the course structure, what is your build order?

Month 1: Module 1 (SOC Foundations) + Module 2 (Detection Engineering Methodology). Establish the operating model, analyst roles, escalation procedures, and charter. Build the detection methodology before any rules. Month 2-3: Modules 3-6 (Detection Rules). Deploy 28 rules across identity, email, endpoint, and cloud — following the methodology from Module 2. Month 4: Modules 7-8 (Playbooks + IR Documentation). Give your analysts structured investigation procedures and report templates. Month 5-6: Modules 9-12 (Hardening, Automation, Metrics, TI). Mature the capability with preventive controls, automation, measurable metrics, and intelligence operations. This follows the four phases in order: framework first, then detection, then response, then operational maturity. By month 6, you have a functioning, documented, measurable SOC capability.
Start with detection rules (Modules 3-6) to show immediate results
Start with Modules 9-12 (hardening and metrics) to establish baselines

2. Your data validation query shows that DeviceProcessEvents has zero rows in the past hour, but all other tables (SigninLogs, AuditLogs, OfficeActivity) have data. What does this mean for the course?

DeviceProcessEvents requires Defender for Endpoint with onboarded devices. If this table is empty, the endpoint detection rules (Module 5: Building Endpoint & Lateral Movement Detections) will not function — DET-SOC-015 through DET-SOC-021 query Device* tables. You can proceed with Modules 1-4 and Module 6 (identity, email, and cloud detections work without endpoint data). Module 5 requires either onboarding devices to Defender for Endpoint or working through the module conceptually without deploying the rules. Note this as a gap in your deployment tracker and address it when endpoint onboarding is available.
You cannot proceed with the course until all tables have data
DeviceProcessEvents is optional — skip Module 5 entirely

3. A colleague says: "I just need the detection rules — I do not need the SOC foundations or methodology modules." Based on what you learned in this module, why might this approach cause problems?

Detection rules without the Module 2 methodology are unmanageable at scale. Module 2 teaches: how to write rule specifications (so someone other than the author can triage alerts), how to tune false positives systematically (not ad hoc), how to track coverage against MITRE ATT&CK (so you know where your gaps are), how to manage the detection backlog (so improvements are prioritized), and how to deploy rules through a tested pipeline (so deployment does not introduce errors). Without the methodology, your colleague deploys 28 rules and within a month faces: undocumented rules they cannot triage, FP patterns they cannot systematically address, no coverage visibility, and no improvement process. The rules are the output; the methodology is what makes them sustainable.
No problem — the detection rules are self-contained and production-ready
They should at least read Module 2 but can skip Module 1
💬

How was this module?

Your feedback helps us improve the course. One click is enough — comments are optional.

Thank you — your feedback has been received.

You're reading the free modules of SOC Operations

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.

View Pricing See Full Syllabus