Cybersecurity Analyst
350 Hours / 8 Months, Part Time Program
This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.
Studies suggest a huge shortage in Cybersecurity Analysts and a constant increase in demand for this profession. According to Deloitte, “A massive and growing talent shortfall is one of the most critical challenges facing the cybersecurity world today. In fact, nowhere in IT is the talent shortage more pronounced than in the cyber arena.”
Cyber attacks are on the rise everywhere you look, making cybersecurity one of the hottest professions in technology.
The highly lucrative role of a Cybersecurity Analyst puts up a fight against hackers looking to penetrate an organization’s network for malicious purposes.
Enable Students to Serve as The Forefront of Organizations' Defense
Students will learn to identify attacks at their earliest stages and prevent significant damage to the organization’s network. Students will develop knowledge of cybersecurity tools, emerging threats, typical vulnerabilities, and hacking patterns.
Learn from Industry Experts
Equip students to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The Cybersecurity Analyst curriculum was created in collaboration with the industry’s leading companies to make our programs as relevant as possible to the local industry’s needs, assuring graduates will be job-ready as soon as the program ends.
Guide Students to Deliver a Professional Project
We believe that the best learning is done through hands-on work. Accordingly, the entire program is run as an ongoing lab during which students are required to install attack and defense environments, set up and build cybersecurity tools, and experience scenarios simulating real-world events.
As the program covers diverse multidisciplinary knowledge and skills, the program’s final BIT (Bring It Together) Project will be devoted to conducting an integrative lab scenario that will require students to demonstrate knowledge, skills, and capabilities from all of the disciplines they have learned.
Who Is the Program For?
Driven and motivated individuals, with or without previous IT background, who wish to advance their career as a Cybersecurity Analyst or a Security Operations Center (SOC) team member.
Real-World Simulations in Cyber Labs
- Advanced cyber labs for educating the next generation of cyber professionals.
- Allows trainers to demonstrate and let students experience real-life scenarios. Students can experiment with potential responses in real-time.
- Student dashboards and detailed reports provide a complete analysis of learning and performance, which will help students learn from their failures and successes on an individual and team level.
Top Notch Professionals
This unique program was built by a professional team made up of the leading experts in Cybersecurity, with vast knowledge and experience in training too.
Eran Lasser
CEO of Wawiwa
Eran is a tech education entrepreneur with over 20 years of experience. Eran founded and managed four IT training companies: John Bryce Training (Israel), TRIG (China), JB-IQsoft (Hungary), KocBryce (Turkey). Eran also partnered to establish DAN.IT Education (Ukraine), Techub (Georgia), and more. In addition, Eran managed Mentergy, which provides e-learning and distance learning solutions. Over the years, he was responsible for the reskilling of more than 50,000 individuals now working as tech professionals.
Daniel Anderson
Chief Training Officer
Daniel is responsible for updating state-of-the-art topics in the company’s tech training programs, and for maintaining its training methodologies. Daniel was the Chief Trainer at the Israel Defense Force’s Tech Training Center and is a graduate of the IDF training process. He develops and delivers a wide range of programming courses, and is a Full-Stack Developer and Data Scientist.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav (CISSP, MBA, Adv.) is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
Program Curriculum
- Course Introductions (Administrative and Preliminaries)
- Computer Structure
- Introduction to Operating Systems
- Operating Systems – the Basics
- Microsoft Operating Systems – the Basics
- Microsoft Operating Systems – Command Line
- Microsoft Operating Systems – Windows Registry
- Windows OS Troubleshooting Exercise
- Module 1 Exam
- OSI Module
- Protocols, Ports & TCP IP
- Packet Tracer
- Various Networking Setups and Troubleshooting
- Network Analysis Intro
- Cloud security
- Module 2 Exam
- Introduction to Windows Server
- DNS and DHCP Services
- Microsoft Active Directory
- System Configurations Management
- Module 3 Exam
- Introduction to Linux
- Linux Shell Basics
- Basic System Administration
- Advanced Shell Tools (grep, sed, awk)
- Introduction to Shell Scripting (Bash)
- Module 4 Exam
- Introduction to Firewalls
- Firewall Architecture
- Policies, Tunnels & Security
- Module 5 Exam
- Variables
- Loops and Conditions
- Automating OS Functionalities
- Module 6 Exam
- Historical Brief of Cybersecurity
- Defining Cybersecurity
- Cyber Security Governance and Compliance
- Cybersecurity Principles
- Module 7 Exam
- Preliminary Alignments
- Attacker Mindset
- Defender Mindset
- Module 8 Exam
- The Security Operation Center (The SOC)
- NIST SP800-60 Methodology
- MITRE ATT&CK Matrix
- Module 9 Exam
- The Technological Building Blocks of SOCs
- Sources of Security Events – The Network
- Sources of Security Events – Desktops and Servers
- Working with Raw Data and Data Parsing
- Administration of SIEM Rules
- Data Aggregation and Events Correlation
- Conducting Triage via SIEM Resources
- Splunk
- Module 10 Exam
- Introduction to CTI
- Introduction to OSINT
- CTI/OSINT Practice
- Module 11 Exam
- Introduction to Cyber Forensics
- Handling Digital Evidence
- Common Cyber Forensics Tools
- Forensics Artifacts – Windows OS
- Forensics Artifacts – Network
- Introduction to Memory Forensics
- Practical Forensic Investigation
- Module 12 Exam
- Malware Analysis Intro
- Static vs Dynamic Malware Analysis
- Dynamic Malware Analysis
- Email Analysis, IOC Investigations
- Writing Investigation Report
- Practical Malware Analysis
- Module 13 Exam
- Hands-On Marathon
- Final Project – Everything we’ve learned in one project
What Do Graduates Have to Say?
Read Our Blogs...
An Insider’s Look into MAMRAM: How Israel’s IDF Trains Tech Talent and Impacts Global Innovation
A behind-the-scenes tour into the secret tech training hub of Israel – MAMRAM, an elite unit within the Israel Defense Forces (IDF)! MAMRAM has long been transforming bright young minds into high-tech wizards and cyber warriors, equipping them with the
Cyber Career Paths: from Cybersecurity Analyst to CISO
The cybersecurity domain provides a breadth of opportunity for tech professionals. From analyzing malware to managing a division of cyber defenders, a career in cyber keeps you on your feet for decades!
Guarding Tomorrow: The Escalating Need for Cybersecurity Expertise
Explore our cyber-vulnerable world: Delve into the digital age’s unseen challenges. As cyber threats increase, the call for 3.4 million cybersecurity experts grows. Are we prepared to defend our digital realm? Dive in with our latest blog and tackle the
Hacking Ukraine: Russia’s Cyber War and Malware Without Borders
In parallel to the war on the ground in Ukraine, a Russian cyber war is targeting the country’s IT infrastructure and potentially the entire world.
The Importance of Cyber Protection for Organizations: A Comprehensive Guide
Organizations and people are heavily dependent on computers, mobile phones, and applications. While technology has made our lives easier, it has also made us vulnerable to cyber-attacks. Hackers and scammers are always on the lookout for vulnerabilities to exploit data
To Get Certified or Not to Get Certified, That’s the Question
By Eran Lasser, Founder and CEO at Wawiwa Tech Training In the fast moving world of technology, currencies change quickly. What was once considered solid gold, can turn into an artifact holding no value within a few short years. Think
Training Cybersecurity Professionals to Close the Tech Skills Gap
Millions of cyber security jobs are vacant. Wawiwa offers two distinct programs for cybersecurity: an entry-level program for beginners and an advanced program for upskilling.
When Tech Teams Tick: The Creation of Digital Products
The technology industry is home to a wide array of positions. When Managers, Designers, Developers, and other tech specialists come together with a unified purpose, the digital products they release are truly incredible!
Women in Cyber: Fighting Hackers and Inequality
Cybersecurity remains one of the most dynamic and exciting technology sectors. However, this sector needs a systemic change in women’s representation and compensation. In this infographic, we state the facts and explore the importance of increasing the presence of women