Skip to content

Welcome to SOCAtlas

SOCAtlas is your complete cybersecurity operations reference — 1200 interview-ready quick points, real SOC alert playbooks, major attack deep-dives, and structured study guides built for analysts, engineers, and anyone preparing for a security role.

Choose sections, switch between color or paper-friendly output, and let Chrome open Save as PDF for the cleanest export. A recommended starter pack is loaded first so you can download faster.

What you will find here

  • 1200 quick-revision points organized into 12 focused domains — from core basics to expert-edge topics
  • 12 SOC alert playbooks covering real-world triage, investigation, containment, and escalation workflows
  • Major attack breakdowns for XSS, SQLi, CSRF, SSRF, MitM, ARP spoofing, and DoS
  • Structured study guides covering fundamentals, networking, threats, detection, governance, and cloud
  • Interview answer frameworks — every concept explained with a definition, mechanism, example, and control

Choose your starting point

  • New to cybersecurity?

    Start with the CIA Triad, encryption, and hashing — the three concepts that come up in every single interview. Then move into networking before anything else.

    Open fundamentals

  • Networking feels unclear?

    Review IP addressing, DNS, DHCP, VPNs, firewalls, proxies, and both the OSI and TCP/IP models. Network knowledge is the backbone of every security discussion.

    Study networking

  • Preparing for SOC analyst roles?

    Work through the SIEM, EDR, IDS/IPS, incident response, and alert playbook sections — exactly what analysts use every shift in a real SOC environment.

    Go to detection and defense

  • Need fast revision?

    Jump straight into the 1200 quick-point pages. Each row gives you the concept name, a one-sentence answer you can say in an interview, and a real-world example.

    Jump to quick points

How to answer any security question

Use this four-step structure and you will sound confident and structured in any technical interview:

  1. Define the concept in one precise sentence.
  2. Explain how it works in plain terms, without unnecessary jargon.
  3. Give an example — a real attack, tool, breach, or scenario.
  4. Connect it to a control, framework, or defense strategy.

Example — firewall: "A firewall is a security control that filters network traffic based on predefined rules. It inspects source IP, destination IP, ports, and protocols to decide what is allowed or blocked. A company might block all inbound RDP from the internet at the perimeter firewall. Firewalls work alongside IDS, IPS, VPNs, and network segmentation as part of a layered defense strategy."

Starting from zero

Step What to Read Why It Matters
1 What is Cybersecurity? Build the mental model before diving into controls
2 CIA Triad, Encryption, Hashing The three pillars every interviewer tests on day one
3 Networking Basics and OSI & TCP/IP Models Everything connects through the network layer
4 Vulnerabilities & Risk and Cyber Threats Understand what you are defending against
5 SIEM & SOAR, SOC Operations, EDR & XDR The tools and platforms defenders use daily
6 Incident Response and SOC Alert Playbooks How to act when something goes wrong

Fast revision before an interview (2 hours)

Time What to Revise
0–30 min Skim Core Basics 1–100 — cover CIA Triad, AAA, and core controls
30–60 min Review Attacks 201–300 and Tools 301–400
60–90 min Read Identity & Auth 101–200 and Security Practices 401–500
90–120 min Finish with MITRE ATT&CK and Frameworks

Must-know concepts at a glance

Concept One-line definition Key tool or reference
CIA Triad Confidentiality, Integrity, Availability — every control maps to one of these Foundation of every security decision
Zero Trust Never trust anything by default; verify every user, device, and context continuously Zscaler, BeyondCorp, Conditional Access
SIEM Centralized log collection, correlation, and alerting for detecting and investigating threats Splunk, Microsoft Sentinel, IBM QRadar
EDR Endpoint monitoring that records behavior and enables detection, containment, and investigation CrowdStrike Falcon, SentinelOne, Defender for Endpoint
MFA Verifying identity with two or more independent factors to stop credential-only attacks Duo Security, YubiKey, Microsoft Authenticator
Zero-Day A vulnerability actively exploited before the vendor has produced a patch Log4Shell, EternalBlue (before MS17-010 patch)
DDoS Flooding a service with traffic from many sources simultaneously until it becomes unavailable Cloudflare, AWS Shield, scrubbing centres
Kill Chain Lockheed Martin model showing how an attack progresses through seven sequential phases Reconnaissance → Actions on Objectives
MITRE ATT&CK Knowledge base of real-world adversary tactics and techniques mapped to detections attack.mitre.org
IR Cycle Structured process — Prepare, Identify, Contain, Eradicate, Recover, Lessons Learned NIST SP 800-61, PICERL (SANS)
CVSS Common Vulnerability Scoring System — rates severity 0–10 based on exploitability and impact CVE-2021-44228 (Log4Shell) scored 10.0
Least Privilege Grant only the minimum access needed for a task, nothing more IAM role scoping, PAM vaults, RBAC

The 12 SOC alert playbooks

Each alert page includes: what the alert means, what to check as L1, a full spoken interview answer, and a memory-friendly summary.

Alert Type What It Covers
General Alert Handling The universal triage workflow for any SIEM alert
Malware Infection EDR/AV alert triage, hash verification, endpoint isolation
Ransomware Attack Containment-first response, backup restore, eradication
Phishing & Email Threats Header analysis, user impact, global purge
DDoS Attack Distinguishing DDoS from traffic spikes, mitigation steps
Brute Force & Password Spray Lockout detection, spray vs. stuffing vs. brute force
CrowdStrike EDR Alert Falcon-specific alert triage and response workflow
Impossible Travel Geo-anomaly investigation and account containment
Suspicious PowerShell Script analysis, AMSI bypass detection, LOL techniques
Data Exfiltration Volume anomalies, DLP alerts, DNS tunneling indicators
SQL Injection (WAF) WAF log analysis, payload review, app-layer investigation
Privilege Escalation Token abuse, lateral movement, admin account containment

Two modes of study

Learning mode: Work through the guide pages under Fundamentals, Networking, Threats, and Detection. They give you context, worked examples, and structured explanations. Revision mode: Switch to the 1200 quick-point pages when you want concise answers you can review in minutes before walking into an interview.