IT and SOC Analyst

200 Hours / 5-6 Months, Part Time Program

This part-time Information Technology (IT) and Security Operations Center (SOC) program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.

The cybersecurity market is projected to grow to $271 billion by 2026, reflecting the increasing importance of protecting digital assets.

Companies are in dire need of IT and SOC Analysts to safeguard their systems, detect and respond to cyber threats, and ensure compliance with security protocols. 

IT and SOC Analysts play a big role in monitoring network activity, investigating incidents, and implementing measures to mitigate risks, making them indispensable in the fight against evolving cyber threats. 

Enable Students to Serve as the Forefront of Organizations' Defense

Students will learn to manage IT systems, troubleshoot technical issues, and implement foundational cybersecurity measures to protect networks and data. They will gain practical skills in monitoring and analyzing system activity, identifying vulnerabilities, and responding to security incidents. By covering both IT and cybersecurity fundamentals, the program prepares participants to handle real-world challenges in tech environments.

Learn from Industry Experts

Equip students to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The IT and SOC Analyst curriculum was created in collaboration with the industry’s leading companies to make our programs as relevant as possible to the local industry’s needs, ensuring graduates will be job-ready as soon as the program ends.

Guide Students to Deliver a Professional Project

We believe that the best learning is achieved through hands-on work. Accordingly, the program includes practical exercises and lab sessions where students apply their skills to real-world scenarios. 

With its multidisciplinary approach, the program’s final BIT (Bring It Together) Project will require students to integrate and demonstrate the knowledge and skills they’ve gained. Graduates will be well-prepared to tackle real-world challenges in entry-level IT and cybersecurity roles.

Who Is the Program For?

Driven and motivated individuals, with or without previous IT background, who wish to advance their careers in entry-level IT and Cybersecurity roles.

Top Notch Professionals

This unique program was built by a professional team made up of the leading experts in Cybersecurity, with vast knowledge and experience in training too.

Eran Lasser

CEO of Wawiwa

Eran is a tech education entrepreneur with over 20 years of experience. Eran founded and managed four IT training companies: John Bryce Training (Israel), TRIG (China), JB-IQsoft (Hungary), KocBryce (Turkey). Eran also partnered to establish DAN.IT Education (Ukraine), Techub (Georgia), and more. In addition, Eran managed Mentergy, which provides e-learning and distance learning solutions. Over the years, he was responsible for the reskilling of more than 50,000 individuals now working as tech professionals.

Daniel Anderson

Chief Training Officer

Daniel is responsible for updating state-of-the-art topics in the company’s tech training programs, and for maintaining its training methodologies. Daniel was the Chief Trainer at the Israel Defense Force’s Tech Training Center and is a graduate of the IDF training process. He develops and delivers a wide range of programming courses, and is a Full-Stack Developer and Data Scientist.

Nadav Nachmias

Nadav Nachmias

Head of Cybersecurity Programs

Nadav (CISSP, MBA, Adv.) is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

Program Curriculum

  • Foundational elements of computer architecture
  • Digital logic, processor architecture, memory hierarchy
  • Overview of operating systems (OS)
  • Focus on Microsoft OS and Windows environments
  • Principles of data transmission
  • Network architectures and protocols
  • OSI model and networking hardware
  • Basics of network security
  • Designing, implementing, and troubleshooting networks
  • Servers and critical network services: DNS and DHCP
  • Domain naming, IP address assignment, and hostname resolution
  • Microsoft Active Directory: centralized user management and resource administration
  • System Configuration Management: server roles and group policy management
  • Best practices for system stability and security
  • Introduction to Linux OS
  • Fundamentals of the Linux command-line interface
  • Navigation and file manipulation
  • Managing and maintaining Linux-based systems
  • Introduction to Bash scripting
  • Role of firewalls in network protection
  • Firewall architecture
  • Network security concepts
  • Security policy formulation and implementation
  • Secure tunnels for data transmission
  • PowerShell in Windows OS environment
  • Automating OS administration functionalities
  • Role in IT and Security operations
  • System configurations and artifact extraction
  • Parsing raw data and process automation
  • Introduction to PowerShell basics: variables, conditioning, loops
  • Historical brief of cybersecurity
  • Definitions: Threat, Risk, Vulnerability
  • Basics of managing cybersecurity
  • Introduction to cybersecurity principles
  • Planning, designing, and evaluating cybersecure systems
  • Overview of international standards and frameworks
  • Preliminaries to web application
  • Offensive capabilities
  • Cybersecurity defensive technologies
  • Basics of a SOC and its operational models
  • SOC interactions: national, industry-specific, organizational, managed services
  • Impact of SOC operations on routine business activities
  • Introduction to Incident Handling and Response
  • Overview of MITRE and the MITRE ATT&CK Matrix
  • Technological foundations of Security Operation Centers (SOC)
  • Administration of Security Information and Event Management (SIEM) rules
  • Proactive identification and response to security incidents
  • Hands-on introduction to navigating and manipulating security event data

What Do Graduates Have to Say?

Read Our Blogs...

Trending

Women in Cyber: Fighting Hackers and Inequality

Cybersecurity remains one of the most dynamic and exciting technology sectors. However, this sector needs a systemic change in women’s representation and compensation. In this infographic, we state the facts and explore the importance of increasing the presence of women

Read More »

Partner with Wawiwa to offer tech training programs in less than 6 months!

Wawiwa bridges the tech skills gap by reskilling people for tech professions in high demand. There are millions of tech vacancies and not enough tech professionals with the relevant knowledge and skills to fill them. What the industry needs of employees is not taught in long academic degrees. Wawiwa helps partners around the world to reskill, and upskill people for tech jobs through local tech training centers or programs. The company utilizes a proven training methodology, cutting-edge content, digital platforms for learning and assessment, and strong industry relations, to deliver training programs that result in higher employability and graduate satisfaction. This, in turn, also creates a strong training brand and a sustainable business for Wawiwa’s partners.