Skip to content

Nexus SecOps Concept Taxonomy

10-Class Classification System

This document defines the taxonomy used to classify the 170 concepts in the Nexus SecOps learning graph. Each concept belongs to exactly one primary category, enabling learners to navigate by topic area.


Taxonomy Categories

1. Foundations & Frameworks

Description: Core security principles, industry frameworks, and foundational SOC concepts

Purpose: Establish baseline knowledge required for all other categories

Key Topics: - Security principles (CIA, defense in depth) - Industry frameworks (MITRE ATT&CK, Cyber Kill Chain) - SOC organizational structure - Core security terminology

Concept Count: 18


2. Telemetry & Data Sources

Description: Log sources, data collection, normalization, and schema standards

Purpose: Understand what data is available and how to prepare it for analysis

Key Topics: - Endpoint, network, cloud, and identity log sources - Log formats and schemas (Syslog, JSON, CEF, ECS) - Data normalization and enrichment - Data retention and compliance

Concept Count: 30


3. Detection Engineering

Description: Building, testing, and maintaining detection rules and logic

Purpose: Learn to identify threats through signatures, heuristics, and behavioral analytics

Key Topics: - Detection logic types (signature, heuristic, behavioral, anomaly) - Rule formats (Sigma, YARA, Snort/Suricata) - Baselines, thresholds, and correlation - Detection coverage and gap analysis - Tuning and testing methodologies

Concept Count: 30


4. Triage & Investigation

Description: Alert handling, enrichment, investigation workflows, and decisioning

Purpose: Master the analyst workflow from alert receipt to incident classification

Key Topics: - Alert triage and prioritization - Enrichment and contextualization - Timeline analysis and pivoting - Runbooks and SOPs - Escalation criteria

Concept Count: 20


5. Threat Intelligence

Description: Collection, analysis, and operationalization of threat intelligence

Purpose: Understand how to leverage external intelligence to improve detection and response

Key Topics: - Intelligence types (strategic, tactical, operational, technical) - Indicators and threat actors - STIX/TAXII standards - Confidence scoring and indicator freshness - Feed integration

Concept Count: 15


6. Automation & Response

Description: SOAR platforms, playbooks, incident response lifecycle, and automation patterns

Purpose: Learn to automate response while maintaining safety and control

Key Topics: - SOAR capabilities and workflows - Playbook design with decision trees - Incident response phases (containment, eradication, recovery) - Safety mechanisms (approval gates, rollbacks, rate limits)

Concept Count: 15


7. Metrics & Evaluation

Description: Performance measurement, KPIs, and model evaluation techniques

Purpose: Quantify SOC effectiveness and AI/ML model performance

Key Topics: - Time-based metrics (MTTD, MTTA, MTTR, MTTC) - Detection quality metrics (precision, recall, F1) - Alert metrics (true/false positives, fatigue) - Model evaluation (ROC, AUC, confusion matrix)

Concept Count: 12


8. Machine Learning in Security

Description: Supervised and unsupervised ML techniques applied to security data

Purpose: Apply traditional ML for classification, clustering, and anomaly detection

Key Topics: - Learning types (supervised, unsupervised, semi-supervised) - Classification and regression - Clustering and outlier detection - Feature engineering - Overfitting, underfitting, and model drift - Training, validation, and test data

Concept Count: 20


9. LLM & AI Guardrails

Description: Large language models, prompt engineering, grounding, and safety controls

Purpose: Safely deploy LLM-based security copilots with appropriate guardrails

Key Topics: - LLM fundamentals and capabilities - Prompt engineering techniques - Retrieval-Augmented Generation (RAG) - Guardrails (input validation, output filtering) - Hallucination and prompt injection awareness - Evaluation frameworks for LLMs

Concept Count: 15


10. Governance, Privacy & Risk

Description: AI governance, bias, privacy-preserving techniques, and risk management

Purpose: Deploy AI responsibly with privacy protections and risk awareness

Key Topics: - Bias in ML and fairness - Explainability and transparency - Privacy-preserving ML techniques - Differential privacy - Adversarial robustness - Evaluation and A/B testing

Concept Count: 10


Category Relationships

graph TD
    A[1. Foundations & Frameworks] --> B[2. Telemetry & Data Sources]
    A --> C[3. Detection Engineering]
    B --> C
    B --> D[4. Triage & Investigation]
    C --> D
    D --> E[5. Threat Intelligence]
    E --> D
    D --> F[6. Automation & Response]
    A --> G[7. Metrics & Evaluation]
    C --> G
    D --> G
    B --> H[8. Machine Learning in Security]
    H --> C
    H --> G
    H --> I[9. LLM & AI Guardrails]
    I --> F
    H --> J[10. Governance Privacy & Risk]
    I --> J

Learning Pathways by Taxonomy

Foundational Path

For learners new to SOC operations: 1. Foundations & Frameworks 2. Telemetry & Data Sources 3. Metrics & Evaluation

Analyst Path

For SOC analysts focusing on triage and investigation: 1. Foundations & Frameworks 2. Detection Engineering 3. Triage & Investigation 4. Threat Intelligence

Detection Engineer Path

For building and maintaining detection capabilities: 1. Foundations & Frameworks 2. Telemetry & Data Sources 3. Detection Engineering 4. Metrics & Evaluation

Automation Path

For SOAR and automation engineers: 1. Foundations & Frameworks 2. Triage & Investigation 3. Automation & Response 4. Governance, Privacy & Risk

AI/ML Path

For applying artificial intelligence to security operations: 1. Foundations & Frameworks 2. Metrics & Evaluation 3. Machine Learning in Security 4. LLM & AI Guardrails 5. Governance, Privacy & Risk


Concept Distribution

Category Count Percentage
1. Foundations & Frameworks 18 10.6%
2. Telemetry & Data Sources 30 17.6%
3. Detection Engineering 30 17.6%
4. Triage & Investigation 20 11.8%
5. Threat Intelligence 15 8.8%
6. Automation & Response 15 8.8%
7. Metrics & Evaluation 12 7.1%
8. Machine Learning in Security 20 11.8%
9. LLM & AI Guardrails 15 8.8%
10. Governance, Privacy & Risk 10 5.9%
Total 170 100%

Usage in Learning Materials

Chapter Mapping — All 40 Chapters

Chapter Title Primary Taxonomy
1 Introduction to AI-Powered SecOps Foundations & Frameworks
2 Telemetry & Logging Telemetry & Data Sources
3 Data Modeling & Normalization Telemetry & Data Sources
4 SIEM, Data Lake & Correlation Telemetry & Data Sources, Detection Engineering
5 Detection Engineering at Scale Detection Engineering
6 Triage, Investigation & Enrichment Triage & Investigation
7 Threat Intelligence & Context Threat Intelligence
8 SOAR, Automation & Playbooks Automation & Response
9 Incident Response Lifecycle Automation & Response
10 AI/ML for SOC Machine Learning in Security
11 LLM Copilots & Guardrails LLM & AI Guardrails
12 Evaluation, Metrics & KPIs Metrics & Evaluation
13 Security Governance, Privacy & Risk Governance & Risk
14 Operating Model, Staffing & SLAs Foundations & Frameworks
15 Resilience, Tabletops & Learning Automation & Response
16 Penetration Testing Methodology Foundations & Frameworks
17 Red Team Operations Detection Engineering, Automation & Response
18 Malware Analysis Triage & Investigation
19 OSINT & Reconnaissance Threat Intelligence
20 Cloud Attack & Defense Telemetry & Data Sources, Governance & Risk
21 OT/ICS/SCADA Security Foundations & Frameworks
22 Threat Actor Encyclopedia Threat Intelligence
23 Ransomware Deep Dive Automation & Response, Detection Engineering
24 Supply Chain Attacks Governance & Risk, Threat Intelligence
25 Social Engineering Threat Intelligence, Foundations & Frameworks
26 Insider Threats Machine Learning in Security, Governance & Risk
27 Digital Forensics Triage & Investigation
28 Advanced Incident Response Automation & Response
29 Vulnerability Management Metrics & Evaluation, Governance & Risk
30 Application Security Detection Engineering, Governance & Risk
31 Network Security Architecture Telemetry & Data Sources, Foundations & Frameworks
32 Cryptography Applied Foundations & Frameworks
33 Identity & Access Security Triage & Investigation, Detection Engineering
34 Mobile & IoT Security Telemetry & Data Sources
35 DevSecOps Pipeline Detection Engineering, Governance & Risk
36 Purple Team Operations Detection Engineering, Automation & Response
37 AI & Machine Learning Security Machine Learning in Security, LLM & AI Guardrails
38 Advanced Threat Hunting Detection Engineering, Triage & Investigation
39 Zero Trust Implementation Foundations & Frameworks, Governance & Risk
40 Security Program Leadership Governance & Risk, Metrics & Evaluation

MicroSim Mapping

Interactive simulations focus on specific taxonomies:

Sim Title Primary Taxonomy
1 Alert Triage Triage & Investigation, Metrics & Evaluation
2 Correlation Tuning Detection Engineering
3 Anomaly Thresholds Detection Engineering, Machine Learning
4 SOAR Playbook Designer Automation & Response
5 TI Enrichment Threat Intelligence
6 Data Normalization Telemetry & Data Sources
7 LLM Prompt Injection LLM & AI Guardrails
8 SOC Metrics Dashboard Metrics & Evaluation
9 Detection Coverage Mapper Detection Engineering
10 Incident Timeline Builder Automation & Response
11 Concept Graph Explorer Foundations & Frameworks
12 Attack Path Visualizer Detection Engineering, Threat Intelligence
13 Ransomware Kill Chain Automation & Response
14 Threat Actor TTP Matrix Threat Intelligence
15 Sigma Rule Builder Detection Engineering
16 Zero Trust Designer Foundations & Frameworks, Governance & Risk

Glossary Organization

The glossary can be browsed by taxonomy category for targeted learning.


Complete Concept-to-Category Mapping

See taxonomy.csv for the complete mapping of all 170 concepts to their primary taxonomy category.


Document Version: 1.0.0 Last Updated: February 2026