This designed to outline the key bodies of knowledge that a competent and effective SOC analyst should master.

Whether you're an aspiring professional or at the early stages of your career, following and committing to this structured path will position you for long-term success.

This road map emphasises deep, practical understanding and equipping you with a comprehensive and operational knowledge base that will serve you well across real-world scenarios and career progression within security operations.

1000014310.jpg


Contents


Rules Of Study

Based on Cognitive Load Theory and empirical studies on memory retention, an effective learning approach should favour short, focused sessions over extended periods, as this reduces cognitive overload, promotes deeper processing, and aligns with the spacing effect. Below is a table of recommended study length. Now this is all personal preference, if you can do more, do more, but it needs to be sustainable

Study Session Length Frequency Ideal Use Case
20–30 mins Daily or every 2 days New, complex topics
45–60 mins 3–4 times per week Revision, consolidation
Pomodoro cycles (25/5) 2–3 per session Maintaining focus and energy
Spaced reviews (10–15 mins) Weekly, monthly Long-term retention
**
Phase Study Duration Daily Commitment Focus
Phase 0  Pre-Game: Orientation & Industry Awareness 2 Days 30-45 minutes Industry knowledge, legal context, career alignment
Phase 1  Foundations: Core Systems & Networking 16-20 weeks 30-60 minutes Windows/Linux OS, networking, command-line proficiency
Phase 2  Detection & Monitoring 10-14 weeks 45-60 minutes SIEM, logging, detection engineering, use case development
Phase 3 Incident Response & Threat Handling 8-12 weeks 45-60 minutes Triage, containment, investigation, IR lifecycle
Phase 4  Threat Intelligence & Adversary Context 6-10 weeks 30-60 minutes Intel lifecycle, ATT&CK, adversary behaviour
Total 40-56 Weeks

Phase 0 – Pre-Game: Orientation

0.1 Understand Industry and Regulatory Expectations