
Solved: Where can I find logs to practice SOC Analyst work?
🚀 Executive Summary TL;DR: Aspiring SOC analysts often struggle to find realistic logs for hands-on practice beyond curated textbook examples. This article addresses the challenge by recommending three actionable methods: leveraging public datasets, building a personal homelab to generate custom traffic, and engaging with online blue team challenges and CTFs. 🎯 Key Takeaways Public datasets like The Mordor Project, Security Onion’s Sample Data, and Malware-Traffic-Analysis.net archives offer quick access to semi-realistic logs for targeted analysis of specific attack techniques and network forensics. Building a homelab, comprising virtual machines for a ‘victim’ (e.g., Apache/WordPress) and a SIEM (e.g., Wazuh, Security Onion), allows analysts to generate their own ‘attack’ traffic and gain a deep, customizable understanding of log generation and system architecture. Online platforms such as LetsDefend, Blue Team Labs Online (BTLO), and CyberDefenders provide curated challenges and sim
Continue reading on Dev.to Tutorial
Opens in a new tab

