Introduction To The SOC For Cybersecurity