SEC0 is here - the beginner certification for getting started in cyber.

The best entry point to cyber for those without a technical background. Take SEC0 and prove you've got what it takes.

Pre Security CertificationPre Security Certification
Feature
BLOG • 7 min read

How to Practise Incident Response with Real Scenarios

Incident response is one of the most in-demand skill sets in cyber security, and one of the hardest to practise without a real job to practise in. The theory is accessible enough. The NIST and SANS frameworks are well documented, and you can read about the phases of an incident lifecycle in an afternoon. What those resources cannot give you is the experience of working through a live scenario: triaging an alert at pace, correlating logs across multiple sources, making containment decisions with incomplete information, and writing up your findings clearly under pressure.

That gap between knowing the theory and being able to do the job is where most early-career candidates struggle, and it is what this guide is designed to address.

Why incident response is harder to learn than it looks

Most technical skills in cyber security have a clear practice loop. You learn a concept, apply it in a lab, get feedback, and improve. Incident response is more layered than that, because the skill is not purely technical. It requires judgement, sequencing, and the ability to stay methodical when a scenario is actively trying to distract you with noise.

A real incident does not announce itself with a clear label. It usually starts with an alert that might be nothing, or might be the first visible sign of something that has been running undetected for weeks. Your job is to determine which it is, gather evidence without contaminating it, scope the impact, and communicate your findings to people who need to act on them, all while the situation may be actively developing.

That is a different kind of skill from running a tool and reading the output. It develops through repetition in realistic environments, which is why scenario-based training is not supplementary to IR learning. It is the core of it.

Know the frameworks, then learn to apply them under pressure

Before practising effectively, you need a mental model for what you are doing and why. Two frameworks dominate the field.

NIST SP 800-61r3 (updated April 2025)

NIST's incident response guidance was significantly updated in April 2025 with the release of Special Publication 800-61 Revision 3. The update aligns IR with the broader NIST Cybersecurity Framework 2.0, moving from a four-phase reactive cycle to a continuous risk management model. The six core functions, Govern, Identify, Protect, Detect, Respond, and Recover, now frame how IR activity is organised. This is the current standard referenced by organisations and employers in 2026, and the one most likely to appear in technical interviews and role specifications.

The full publication is available at csrc.nist.gov/pubs/sp/800/61/r3/final. It is free, authoritative, and worth reading alongside your hands-on training.

The SANS IR lifecycle

SANS uses a six-phase model: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. It covers the same ground as NIST but with more granular phase separation, which many practitioners find easier to apply step-by-step during an active incident. Familiarity with both frameworks is useful, as different organisations and interviewers reference each.

The practical value of these frameworks is not memorising the phases. It is using them as a decision scaffold when a scenario is live in front of you, ensuring you do not skip steps under pressure.

TryHackMe: Incident Response Fundamentals room

Covers incident classification, severity levels, both the NIST and SANS frameworks, and a hands-on lab working through a realistic scenario. The right starting point before moving to more advanced scenario practice.

Five scenario types every IR practitioner needs to work through

IR roles demand versatility. Practising across different scenario types builds the range that real SOC and incident response positions require. These five categories cover the most common incident types you will encounter in both training environments and live roles.

1. Phishing and malicious email investigation

Phishing remains the most common initial access vector in reported incidents. Working through phishing scenarios builds the skills to triage a suspicious email, extract and analyse headers, identify indicators of compromise in attachments or linked URLs, and assess whether the email was acted on by a recipient.

This scenario type is well suited to early practice because the artefacts are contained and the investigation follows a clear sequence. It is also one of the most commonly tested areas in SOC analyst interviews.

TryHackMe: Phishing Analysis modules (SOC Level 1 path)

The SOC Level 1 path includes dedicated phishing analysis modules covering email header analysis, URL investigation, and attachment triage. The 2025 revamp added a phishing simulation module that puts theory into practice with realistic scenarios.

2. SIEM-based log investigation

Most IR work in a SOC begins at the SIEM. An alert fires, and you need to determine whether it represents a genuine incident. That requires efficient log querying, cross-source correlation, distinguishing attacker behaviour from noise, and building a coherent timeline of activity.

Splunk is the most widely deployed SIEM in enterprise environments, and proficiency with it is explicitly requested in a significant proportion of SOC analyst job postings. Practising in realistic Splunk environments with actual log data is one of the highest-value activities for anyone preparing for an IR role.

TryHackMe: Incident Handling with Splunk room

An end-to-end investigation scenario mapped against the Cyber Kill Chain. You investigate a web defacement attack against a fictional organisation, working through reconnaissance, exploitation, and installation phases using real log sources including IIS, Suricata, and Sysmon.

TryHackMe: Investigating with Splunk room

A focused investigation across a compromised network of Windows machines. You identify a backdoor user, trace malicious PowerShell execution, and reconstruct the attacker's actions from Sysmon and event log data. Strong preparation for interview-style walkthroughs.

3. Digital forensics and memory analysis

When containment is not immediate, or when an investigation needs to reconstruct attacker activity after the fact, digital forensics becomes the core skill. This includes artefact collection from Windows and Linux systems, file system and registry analysis, and memory forensics using tools like Volatility to extract active processes, network connections, and indicators of compromise from RAM captures.

Memory forensics is a differentiating skill at the junior level. Most early-career candidates have limited exposure to it, which makes demonstrated competence a genuine advantage in both applications and technical interviews.

TryHackMe: DFIR: An Introduction room

Introduces the Digital Forensics and Incident Response methodology, covering artefact types, chain of custody principles, forensic tooling (Volatility, KAPE, Autopsy, Redline, Velociraptor), and the relationship between forensic evidence and the IR lifecycle.

TryHackMe: SOC Level 2 path

Extends SOC Level 1 skills into more advanced incident investigation, threat hunting, and forensic analysis. For learners who have completed the SOC Level 1 path and want to push into more demanding IR scenarios.

4. Ransomware response

Ransomware incidents are among the most disruptive and time-critical scenarios a response team faces. The challenge is not just technical containment but sequencing: determining what has been encrypted, isolating affected systems, verifying backup integrity, and communicating with stakeholders while the situation is still developing.

Practising ransomware response scenarios builds the decision-making speed and prioritisation instinct that this incident type demands. It also directly mirrors scenarios used in hiring assessments for IR analyst roles, making it well worth including in your training rotation.

5. Insider threat and anomalous behaviour investigation

Not every incident originates externally. Insider threats, whether malicious, negligent, or accidental, require a different investigative approach. The artefacts are often more subtle, the scope of legitimate access complicates analysis, and the investigation involves considerations that extend beyond the purely technical.

Practising this scenario type develops the careful, methodical approach and willingness to question assumptions that experienced IR practitioners apply across all investigation types, not only those involving obvious external attackers.

Working through all five scenario types in sequence gives you the range that a real SOC or IR role requires. Each one adds a different dimension to your analytical toolkit, and together they map closely to the incident types you will encounter in a live environment.

Getting the most from scenario-based IR practice

Document as you go

In a real incident, documentation is not optional. It produces the timeline, supports the post-incident report, and records the chain of evidence. Practising documentation during training builds both the habit and the communication skill that hiring managers specifically look for.

For every scenario you work through, write a brief incident timeline as you investigate: what you found, what action you took, what it led to, and what your conclusions were. That habit, applied consistently, translates directly to the report-writing competence that separates strong IR candidates from those who can describe what they did but cannot document it clearly.

Introduce time pressure

Real IR work happens under constraint. Practising without a clock is useful when learning, but at some point you need to replicate the pressure that live incidents create. Set a target time for a scenario, complete your investigation, then review what you missed and why. That cycle of constrained practice and honest review builds the operational instinct that distinguishes a capable practitioner from someone still working primarily in theory.

Follow structured paths, not random rooms

The most efficient route to IR competence on TryHackMe is through a structured learning path rather than rooms selected ad hoc. The SOC Level 1 path builds the foundational skills, including SIEM operation, phishing analysis, and digital forensics fundamentals, in a sequence that mirrors how these skills are applied in real investigations. The SOC Level 2 path extends that into more advanced IR and threat hunting scenarios.

The SOC Level 1 path was significantly updated in late 2025 to reflect current entry-level analyst responsibilities, including new modules on alert triage workflows, Windows threat detection, web attack investigation, and multi-source log correlation. If you completed an earlier version, the updated content is worth revisiting.

Use the Incident Response module as a reference point

TryHackMe's dedicated Incident Response module covers the IR process from preparation through to lessons learned, with rooms addressing each phase in sequence. Working through this module alongside practical scenario rooms gives you both the conceptual structure and the hands-on application in parallel.

Turning practice into proof for employers

Practising IR scenarios develops the skill. Being able to demonstrate to an employer that the skill has been independently validated is what moves a job search forward.

The SAL1 certification is a practical, timed exam that tests SOC analyst competence in a simulated real-world environment. It covers alert triage, phishing investigation, and incident analysis under exam conditions, and is backed by Accenture and Salesforce. For anyone working toward a first SOC or IR analyst role, it is a direct signal to employers that your skills have been assessed independently, not self-reported.

The SOC Level 1 path is the recommended preparation route for SAL1. The path builds the skills; the certification validates them. Working through both in sequence is the most direct route from training to a credible, employer-facing record of competence.

The gap between having read about incident response and being able to demonstrate it under time pressure is where most candidates stall. Scenario-based training on a platform built for this kind of practice closes that gap in a way that passive study cannot.

Start building your IR skills on TryHackMe

Whether you are new to defensive security or building toward a specific SOC or IR analyst role, the structured paths on TryHackMe provide the most direct route from learning the concepts to demonstrating the competence.

authorNick O'Grady
Feb 27, 2026

Join over 640 organisations upskilling their
workforce with TryHackMe

We use cookies to ensure you get the best user experience. For more information see our cookie policy.