Analista de ciberseguridad
350 Hours / 8 Months, Part Time Program
This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.
Studies suggest a huge shortage in Cybersecurity Analysts and a constant increase in demand for this profession. According to Deloitte, “A massive and growing talent shortfall is one of the most critical challenges facing the cybersecurity world today. In fact, nowhere in IT is the talent shortage more pronounced than in the cyber arena.”
Cyber attacks are on the rise everywhere you look, making cybersecurity one of the hottest professions in technology.
The highly lucrative role of a Cybersecurity Analyst puts up a fight against hackers looking to penetrate an organization’s network for malicious purposes.
Enable Students to Serve as The Forefront of Organizations' Defense
Students will learn to identify attacks at their earliest stages and prevent significant damage to the organization’s network. Students will develop knowledge of cybersecurity tools, emerging threats, typical vulnerabilities, and hacking patterns.

Learn from Industry Experts
Equip students to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The Cybersecurity Analyst curriculum was created in collaboration with the empresas líderes del sector para que nuestros programas respondan lo mejor posible a las necesidades de la industria local, garantizando que los graduados estén preparados para trabajar en cuanto terminen el programa.
Guiar a los estudiantes para que realicen un proyecto profesional
We believe that the best learning is done through hands-on work. Accordingly, the entire program is run as an ongoing lab during which students are required to install attack and defense environments, set up and build cybersecurity tools, and experience scenarios simulating real-world events.
As the program covers diverse multidisciplinary knowledge and skills, the program’s final BIT (Bring It Together) Project will be devoted to conducting an integrative lab scenario that will require students to demonstrate knowledge, skills, and capabilities from all of the disciplines they have learned.
¿A quién va dirigido el programa?
Driven and motivated individuals, with or without previous IT background, who wish to advance their career as a Cybersecurity Analyst or a Security Operations Center (SOC) team member.
Real-World Simulations in Cyber Labs

- Advanced cyber labs for educating the next generation of cyber professionals.
- Allows trainers to demonstrate and let students experience real-life scenarios. Students can experiment with potential responses in real-time.
- Student dashboards and detailed reports provide a complete analysis of learning and performance, which will help students learn from their failures and successes on an individual and team level.
Profesionales de primera categoría
This unique program was built by a professional team made up of the leading experts in Cybersecurity, with vast knowledge and experience in training too.

Eran Lasser
Director General de Wawiwa
Eran es un emprendedor de la educación tecnológica con más de 20 años de experiencia. Eran fundó y dirigió cuatro empresas de formación en TI: Formación John Bryce (Israel), TRIG (China), JB-IQsoft (Hungría), KocBryce (Turquía). Eran también se asoció para establecer DAN.IT Educación (Ucrania), Techub (Georgia), etc. Además, Eran dirigió Mentergy, que ofrece soluciones de aprendizaje electrónico y a distancia. A lo largo de los años, fue responsable de la reconversión profesional de más de 50.000 personas que ahora trabajan como profesionales de la tecnología.



Daniel Anderson
Jefe de Formación
Daniel es responsable de la actualización de los temas de vanguardia en los programas de formación técnica de la empresa y del mantenimiento de sus metodologías de formación. Daniel fue formador jefe en el Centro de Formación Técnica de las Fuerzas de Defensa de Israel y se graduó en el proceso de formación de las FDI. Desarrolla e imparte una amplia gama de cursos de programación, y es Desarrollador Full-Stack y Científico de Datos.


Nadav Nachmias
Jefe de Programas de Ciberseguridad
Nadav (CISSP, MBA, Adv.) is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

Program Curriculum
- Course Introductions (Administrative and Preliminaries)
- Computer Structure
- Introduction to Operating Systems
- Operating Systems – the Basics
- Microsoft Operating Systems – the Basics
- Microsoft Operating Systems – Command Line
- Microsoft Operating Systems – Windows Registry
- Windows OS Troubleshooting Exercise
- Module 1 Exam
- OSI Model
- Protocols, Ports & TCP IP
- Packet Tracer
- Various Networking Setups and Troubleshooting
- Network Analysis Intro
- Cloud security
- Module 2 Exam
- Introduction to Windows Server
- DNS and DHCP Services
- Microsoft Active Directory
- System Configurations Management
- Module 3 Exam
- Introduction to Linux
- Linux Shell Basics
- Basic System Administration
- Advanced Shell Tools (grep, sed, awk)
- Introduction to Shell Scripting (Bash)
- Module 4 Exam
- Introduction to Firewalls
- Firewall Architecture
- Policies, Tunnels & Security
- Module 5 Exam
- Variables
- Loops and Conditions
- Automating OS Functionalities
- Module 6 Exam
- Historical Brief of Cybersecurity
- Defining Cybersecurity
- Cyber Security Governance and Compliance
- Cybersecurity Principles
- Module 7 Exam
- Preliminary Alignments
- Attacker Mindset
- Defender Mindset
- Module 8 Exam
- The Security Operation Center (The SOC)
- NIST SP800-60 Methodology
- MITRE ATT&CK Matrix
- Module 9 Exam
- The Technological Building Blocks of SOCs
- Sources of Security Events – The Network
- Sources of Security Events – Desktops and Servers
- Working with Raw Data and Data Parsing
- Administration of SIEM Rules
- Data Aggregation and Events Correlation
- Conducting Triage via SIEM Resources
- Splunk
- Module 10 Exam
- Introduction to CTI
- Introduction to OSINT
- CTI/OSINT Practice
- Module 11 Exam
- Introduction to Cyber Forensics
- Handling Digital Evidence
- Common Cyber Forensics Tools
- Forensics Artifacts – Windows OS
- Forensics Artifacts – Network
- Introduction to Memory Forensics
- Practical Forensic Investigation
- Module 12 Exam
- Malware Analysis Intro
- Static vs Dynamic Malware Analysis
- Dynamic Malware Analysis
- Email Analysis, IOC Investigations
- Writing Investigation Report
- Practical Malware Analysis
- Module 13 Exam
- Hands-On Marathon
- Final Project – Everything we’ve learned in one project
What Do Graduates Have to Say?

Lea nuestros blogs...

An Insider’s Look into MAMRAM: How Israel’s IDF Trains Tech Talent and Impacts Global Innovation
A behind-the-scenes tour into the secret tech training hub of Israel – MAMRAM, an elite unit within the Israel Defense Forces (IDF)! MAMRAM has long been transforming bright young minds into high-tech wizards and cyber warriors, equipping them with the

Best Cyber Security Courses to Land Top In-Demand Jobs
Cybersecurity is one of the most sought-after fields, offering high salaries, job security, and the chance to protect enterprises’ digital assets and combat cyber threats. As organizations increasingly prioritize data protection, the demand for skilled professionals has skyrocketed. Entry-level salaries

Coursera Cybersecurity Alternatives
Cybersecurity skills are more essential than ever, with nearly 90% of organizations experiencing some form of breach in recent years due to a lack of expertise. This highlights the urgent need for professionals with the right skills to combat cyber

Cyber Career Paths: from Cybersecurity Analyst to CISO
The cybersecurity domain provides a breadth of opportunity for tech professionals. From analyzing malware to managing a division of cyber defenders, a career in cyber keeps you on your feet for decades!

Guarding Tomorrow: The Escalating Need for Cybersecurity Expertise
Explore our cyber-vulnerable world: Delve into the digital age’s unseen challenges. As cyber threats increase, the call for 3.4 million cybersecurity experts grows. Are we prepared to defend our digital realm? Dive in with our latest blog and tackle the

Hacking Ukraine: Russia’s Cyber War and Malware Without Borders
In parallel to the war on the ground in Ukraine, a Russian cyber war is targeting the country’s IT infrastructure and potentially the entire world.

The Importance of Cyber Protection for Organizations: A Comprehensive Guide
Organizations and people are heavily dependent on computers, mobile phones, and applications. While technology has made our lives easier, it has also made us vulnerable to cyber-attacks. Hackers and scammers are always on the lookout for vulnerabilities to exploit data

To Get Certified or Not to Get Certified, That’s the Question
By Eran Lasser, Founder and CEO at Wawiwa Tech Training In the fast moving world of technology, currencies change quickly. What was once considered solid gold, can turn into an artifact holding no value within a few short years. Think

Training Cybersecurity Professionals to Close the Tech Skills Gap
Millions of cyber security jobs are vacant. Wawiwa offers two distinct programs for cybersecurity: an entry-level program for beginners and an advanced program for upskilling.

When Tech Teams Tick: The Creation of Digital Products
The technology industry is home to a wide array of positions. When Managers, Designers, Developers, and other tech specialists come together with a unified purpose, the digital products they release are truly incredible!