SOC SIMULATOR

v2.6.0

Train like a real SOC analyst

Practice incident response in a risk-free cybersecurity simulation. Investigate threats, analyze logs, and level up your blue team skills.

0Threat Types
0Levels
0Achievements
0Commands
Scroll to explore
Why SOC Simulator

The training gap between theory and the SOC floor

01

Practice Real Incident Response

Most cybersecurity training is reading and memorizing. SOC Simulator puts you in the analyst seat — investigate live threats, correlate evidence across log sources, and make response decisions that get graded. The same workflow you’ll use on day one of a SOC role.

02

No Setup Required

No VMs to spin up. No subscriptions. No accounts. Open your browser and start analyzing threats in 30 seconds. All evidence, logs, and tools run locally — your progress saves automatically.

03

Built on Real Frameworks

Every threat maps to MITRE ATT&CK techniques. Log formats match real syslog, Apache, and UFW output. Investigation scoring follows NIST SP 800-61 incident response procedures. Skills transfer directly to real SOC environments.

Features

Everything you need to train

A realistic SOC environment with investigation tools, terminal access, and threat intelligence — all connected through an evidence pipeline.

🔍

Investigation Scoring

Earn S-F grades with educational feedback on every case you close.

💻

Live Terminal

Real commands, pipes, and log analysis in a fully interactive shell.

📧

Phishing Detection

Progressive difficulty email security training with realistic lures.

🛡

Threat Intelligence

Simulated IOC lookups across reputation databases and OSINT feeds.

📈

20 Levels

Progress from Trainee to Threat Hunter through escalating challenges.

🔗

Connected Systems

Evidence pipeline links terminal, email, and investigation modules.

How It Works

The core gameplay loop

Every session follows the same cycle real SOC analysts use daily.

1

MONITOR

Threats appear on your dashboard in real-time

2

INVESTIGATE

Search logs with real terminal commands

3

RESPOND

Choose the right mitigation action and get graded

4

PROGRESS

Earn XP, level up, unlock new tools and harder challenges

What You'll Learn

Skills that transfer to the job

Log analysis with grep, cut, sort, uniq
MITRE ATT&CK technique identification
Phishing email detection & header analysis
Firewall rule management
Incident response workflow (NIST 800-61)
Evidence correlation across multiple sources
Threat intelligence lookup & IOC enrichment
Investigation documentation & reporting

Free. No account needed. Built for learners.

Start building real SOC skills in your browser.