Protección de la ciberseguridad de las organizaciones

Upskilling Course, 28 Academic Hours

Develop Knowledge of Security Principles in the Digital Arena

Cyber attacks are on the rise everywhere you look, making understanding and controlling cyber threats increasingly important to ensuring the resilience of organizations at every level.

This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. 

By enrolling in this course, you're going to learn how to handle common security incidents, familiarize yourself with common security tools, and delve into in-depth cyber defense methodologies, including the Cyber Kill Chain. Additionally, the course provides crucial insights into governance, risk management, and compliance principles vital for any organization.

Who should attend?

  • Organizational decision makers 
  • Tech-oriented employees
  • Tech and IT teams 
  • Security teams 
  • STEM students 
  • Business Administration graduates

Learning Objectives

  • Understand cybersecurity monitoring and prevention tools 
  • Develop an understanding of Incident Response plans and methodologies 
  • Become acquainted with the Vulnerability and Patch Management process 
  • Learn about different types of attacks, including tactics and techniques
  • Gain an overview of SIEM and SOAR environments 
  • Acquire experience with investigation processes, including Malware Analysis and Digital Forensics
  • Understand the “Zero Trust” security concept

What You'll Get...

Supervisor profesional e instructores

Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias Head of Cybersecurity Programs

Nadav Nachmias

Jefe de Programas de Ciberseguridad

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus

Lesson 1: Introduction to Cybersecurity (5 hours)

  • Introduction to Cyber Defense: Case Studies of Ineffective Strategies
  • The Fundamental Role of Education and Training: Building Human Firewalls
  • Common Cybersecurity Terminology
  • Core Cybersecurity Principles
  • Cybersecurity Technologies
  • The CIA Triad

Lesson 2: Introduction to Incident Response & Social Engineering (5 hours)

  • Cyber Security Operation Center (SOC)   
  • Critical Assets 
  • Introduction to Cyberattacks
  • Threat Actors
  • Events vs. Incidents
  • Incident Response (IR) Phases
  • Cyber Kill Chain 
  • Introduction to Social Engineering
  • Social Engineering Countermeasures and Best Practices

Lesson 3: SIEM & SOAR (5 hours)

  • SIEM Concepts 
  • SIEM Functionality and Key Features
  • Top SIEM Technologies
  • SOAR: Concept and Functionality

Lesson 4: Cryptography & Cyber Controls (5 hours)

  • Introduction to Cryptography – Common Terminologies
  • Basics of Cryptography – How it works, Hash Algorithms 
  • The Concept of “Trust” in Cryptography 
  • Defining Cybersecurity Controls
  • Endpoint Security Controls – Operating Systems
  • Network Security Controls – Firewalls, IDPS, Network Access Control
  • Advanced Control Capabilities – AI/ML, Context, and Behavior Analysis

Lesson 5: Data and Service Protection, Security as a Process and Governance, Risk Management and Compliance (GRC) (5 Hours)

  • Ground-Up Security: Protecting Data and Services
  • Data Loss Prevention (DLP)
  • Application Security and Secure Software Development Life Cycle (SSDLC)
  • Identity Management and Governance
  • Disaster Recovery Planning
  • Business Continuity Strategies
  • Security as a Process: Continuous Improvement and Monitoring Tools
  • Zero Trust: Case Histories

Lesson 6: Course Recap & Final Test (3 hours)

  • Comprehensive Course Content Review
  • Final Assessment: Covering All Topics

Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.

Interested in more details?

We’d be happy to answer all your questions!

¡Asóciese con Wawiwa para ofrecer programas de formación tecnológica en menos de 6 meses!

Wawiwa cubre el vacío de competencias tecnológicas reciclando a personas para profesiones tecnológicas muy demandadas. Hay millones de vacantes en el sector tecnológico y no hay suficientes profesionales con los conocimientos y habilidades necesarios para cubrirlas. Lo que la industria necesita de sus empleados no se enseña en largas carreras académicas. Wawiwa ayuda a sus socios de todo el mundo a reciclar y mejorar las cualificaciones de las personas para puestos tecnológicos a través de centros o programas locales de formación tecnológica. La empresa utiliza una metodología de formación probada, contenidos de vanguardia, plataformas digitales para el aprendizaje y la evaluación, y sólidas relaciones con la industria, para ofrecer programas de formación que se traducen en una mayor empleabilidad y satisfacción de los graduados. Esto, a su vez, también crea una marca de formación fuerte y un negocio sostenible para los socios de Wawiwa.