IT and SOC Analyst
200 Hours / 5-6 Months, Part Time Program
This part-time Information Technology (IT) and Security Operations Center (SOC) program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.
The cybersecurity market is projected to grow to $271 billion by 2026, reflecting the increasing importance of protecting digital assets.
Companies are in dire need of IT and SOC Analysts to safeguard their systems, detect and respond to cyber threats, and ensure compliance with security protocols.
IT and SOC Analysts play a big role in monitoring network activity, investigating incidents, and implementing measures to mitigate risks, making them indispensable in the fight against evolving cyber threats.
Enable Students to Serve as the Forefront of Organizations' Defense
Students will learn to manage IT systems, troubleshoot technical issues, and implement foundational cybersecurity measures to protect networks and data. They will gain practical skills in monitoring and analyzing system activity, identifying vulnerabilities, and responding to security incidents. By covering both IT and cybersecurity fundamentals, the program prepares participants to handle real-world challenges in tech environments.
Learn from Industry Experts
Equip students to succeed in a rapidly expanding field with help from our network of cyber experts, instructors, hiring partners, and alumni. The IT and SOC Analyst curriculum was created in collaboration with the industry’s leading companies to make our programs as relevant as possible to the local industry’s needs, ensuring graduates will be job-ready as soon as the program ends.
Guide Students to Deliver a Professional Project
We believe that the best learning is achieved through hands-on work. Accordingly, the program includes practical exercises and lab sessions where students apply their skills to real-world scenarios.
With its multidisciplinary approach, the program’s final BIT (Bring It Together) Project will require students to integrate and demonstrate the knowledge and skills they’ve gained. Graduates will be well-prepared to tackle real-world challenges in entry-level IT and cybersecurity roles.
Who Is the Program For?
Driven and motivated individuals, with or without previous IT background, who wish to advance their careers in entry-level IT and Cybersecurity roles.
Top Notch Professionals
This unique program was built by a professional team made up of the leading experts in Cybersecurity, with vast knowledge and experience in training too.
Eran Lasser
CEO of Wawiwa
Eran is a tech education entrepreneur with over 20 years of experience. Eran founded and managed four IT training companies: John Bryce Training (Israel), TRIG (China), JB-IQsoft (Hungary), KocBryce (Turkey). Eran also partnered to establish DAN.IT Education (Ukraine), Techub (Georgia), and more. In addition, Eran managed Mentergy, which provides e-learning and distance learning solutions. Over the years, he was responsible for the reskilling of more than 50,000 individuals now working as tech professionals.
Daniel Anderson
Chief Training Officer
Daniel is responsible for updating state-of-the-art topics in the company’s tech training programs, and for maintaining its training methodologies. Daniel was the Chief Trainer at the Israel Defense Force’s Tech Training Center and is a graduate of the IDF training process. He develops and delivers a wide range of programming courses, and is a Full-Stack Developer and Data Scientist.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav (CISSP, MBA, Adv.) is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
Program Curriculum
- Foundational elements of computer architecture
- Digital logic, processor architecture, memory hierarchy
- Overview of operating systems (OS)
- Focus on Microsoft OS and Windows environments
- Principles of data transmission
- Network architectures and protocols
- OSI model and networking hardware
- Basics of network security
- Designing, implementing, and troubleshooting networks
- Servers and critical network services: DNS and DHCP
- Domain naming, IP address assignment, and hostname resolution
- Microsoft Active Directory: centralized user management and resource administration
- System Configuration Management: server roles and group policy management
- Best practices for system stability and security
- Introduction to Linux OS
- Fundamentals of the Linux command-line interface
- Navigation and file manipulation
- Managing and maintaining Linux-based systems
- Introduction to Bash scripting
- Role of firewalls in network protection
- Firewall architecture
- Network security concepts
- Security policy formulation and implementation
- Secure tunnels for data transmission
- PowerShell in Windows OS environment
- Automating OS administration functionalities
- Role in IT and Security operations
- System configurations and artifact extraction
- Parsing raw data and process automation
- Introduction to PowerShell basics: variables, conditioning, loops
- Historical brief of cybersecurity
- Definitions: Threat, Risk, Vulnerability
- Basics of managing cybersecurity
- Introduction to cybersecurity principles
- Planning, designing, and evaluating cybersecure systems
- Overview of international standards and frameworks
- Fundamentals of web applications: Client and Server
- Introduction to Front-end and Back-end concepts
- Basics of HTML, JavaScript, and SQL databases
- Familiarization with browser “Developer Tools”
- Exploration of vulnerable web applications and cybersecurity controls
- Basics of a SOC and its operational models
- SOC interactions: national, industry-specific, organizational, managed services
- Impact of SOC operations on routine business activities
- Introduction to Incident Handling and Response
- Overview of MITRE and the MITRE ATT&CK Matrix
- Technological foundations of Security Operation Centers (SOC)
- Administration of Security Information and Event Management (SIEM) rules
- Proactive identification and response to security incidents
- Hands-on introduction to navigating and manipulating security event data
What Do Graduates Have to Say?
Read Our Blogs...
An Insider’s Look into MAMRAM: How Israel’s IDF Trains Tech Talent and Impacts Global Innovation
A behind-the-scenes tour into the secret tech training hub of Israel – MAMRAM, an elite unit within the Israel Defense Forces (IDF)! MAMRAM has long been transforming bright young minds into high-tech wizards and cyber warriors, equipping them with the
Cyber Career Paths: from Cybersecurity Analyst to CISO
The cybersecurity domain provides a breadth of opportunity for tech professionals. From analyzing malware to managing a division of cyber defenders, a career in cyber keeps you on your feet for decades!
Guarding Tomorrow: The Escalating Need for Cybersecurity Expertise
Explore our cyber-vulnerable world: Delve into the digital age’s unseen challenges. As cyber threats increase, the call for 3.4 million cybersecurity experts grows. Are we prepared to defend our digital realm? Dive in with our latest blog and tackle the
Hacking Ukraine: Russia’s Cyber War and Malware Without Borders
In parallel to the war on the ground in Ukraine, a Russian cyber war is targeting the country’s IT infrastructure and potentially the entire world.
The Importance of Cyber Protection for Organizations: A Comprehensive Guide
Organizations and people are heavily dependent on computers, mobile phones, and applications. While technology has made our lives easier, it has also made us vulnerable to cyber-attacks. Hackers and scammers are always on the lookout for vulnerabilities to exploit data
To Get Certified or Not to Get Certified, That’s the Question
By Eran Lasser, Founder and CEO at Wawiwa Tech Training In the fast moving world of technology, currencies change quickly. What was once considered solid gold, can turn into an artifact holding no value within a few short years. Think
Training Cybersecurity Professionals to Close the Tech Skills Gap
Millions of cyber security jobs are vacant. Wawiwa offers two distinct programs for cybersecurity: an entry-level program for beginners and an advanced program for upskilling.
When Tech Teams Tick: The Creation of Digital Products
The technology industry is home to a wide array of positions. When Managers, Designers, Developers, and other tech specialists come together with a unified purpose, the digital products they release are truly incredible!
Women in Cyber: Fighting Hackers and Inequality
Cybersecurity remains one of the most dynamic and exciting technology sectors. However, this sector needs a systemic change in women’s representation and compensation. In this infographic, we state the facts and explore the importance of increasing the presence of women