Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Primary-source-grounded cybersecurity course
A primary-source-grounded six-module path into the Security Operations Center analyst role: detection, triage, containment, hunting, and the career ladder from Tier 1 through Tier 3.
SOC Analyst Fundamentals is a 6-module cybersecurity course for career changers and IT professionals targeting an entry-level Security Operations Center analyst role in 2026. Every module connects a primary-source standard (NIST SP 800-61 Rev. 2 incident handling, NIST SP 800-92 log management, MITRE ATT&CK Enterprise) to the daily work of a SOC analyst: alert triage, log correlation, indicator-of-compromise extraction, escalation handoffs, and the structured analytic techniques used in mature SOCs. The course is designed for adults committing 6 to 8 weeks of focused study before sitting CompTIA Security+ or CySA+. It does not promise employment; it gives you the working vocabulary, mental models, and study cadence that a hiring manager filtering for SOC Tier 1 candidates expects to see in a portfolio interview. Designed by Julian Calvo, Ed.D. in Applied Learning Sciences (University of Miami, 2026).
The course sequences six modules around the operational lifecycle of a security alert as defined in NIST SP 800-61 Revision 2 (Cichonski, Millar, Grance, & Scarfone, 2012). Each module pairs a primary-source standard with a hands-on prompt: read the standard, apply it to a realistic alert scenario, write the analyst note that would land in the case management system. The pedagogical scaffolding follows Kolb's experiential learning cycle (Kolb, 1984) and Bandura's self-efficacy theory (Bandura, 1997): concrete reading, structured reflection, abstract conceptualization through the standard, then active experimentation in a home lab. The course is opinionated about source quality: every claim is sourced to NIST, MITRE, SANS, BLS, or peer-reviewed research. No vendor white papers without primary-source backing. No exam dump references.
Module 01 · 110 min
The day-to-day work, the three-tier ladder, the BLS occupational data behind the role, and the difference between what hiring managers say they want and what the job actually demands.
Module 02 · 130 min
The MITRE ATT&CK framework as the working vocabulary of the modern SOC, the kill chain heritage, and how to read the framework as a Tier 1 analyst rather than a researcher.
Module 03 · 140 min
How a SIEM is built, what NIST SP 800-92 says about log management, and the difference between alert volume and alert fidelity.
Module 04 · 120 min
The four phases of NIST SP 800-61, the analyst's role inside each phase, and the documentation patterns that turn an alert into an incident record.
Module 05 · 110 min
How proactive hunting differs from reactive triage, the structured analytic techniques borrowed from intelligence analysis, and the data sources you actually need.
Module 06 · 100 min
The 24-month plan from first SOC role to Tier 3, the credentials that move you, the portfolio artifacts that prove you, and the salary numbers behind each step.
This course is for educational purposes only. It does not guarantee employment, interview invitations, or salary outcomes. Cybersecurity job-market conditions vary by region, economic cycle, and individual circumstances. NIST and MITRE materials cited here are public-domain US Government works; readers should consult primary sources for currency. CompTIA Security+ and CySA+ are trademarks of CompTIA; DecipherU is not affiliated with CompTIA. DecipherU is not responsible for career or financial decisions made based on this content.