Training of Advanced Level Monitoring Team – Analyst Tier 2
Upskilling Course, 40 Academic Hours
Step Up to Tier 2: Enhance Cyber Monitoring, Elevate Your Security.
- Level: Advanced
This course is designed for SOC analysts stepping up to Tier 2, emphasizing the orchestration of the triage process and the handling of escalated alerts. The course deepens the foundational Tier 1 concepts, introducing advanced leadership techniques, effective incident response strategies, and refined cybersecurity skills.
By enrolling in this course, you'll deepen your understanding and skills in both the administration and operations of a SOC, as required for Tier 2 analysts.
Who Is This Course For?
- IT and Cybersecurity juniors
- Cybersecurity Analysts and Practitioners
- Security Operations (SecOps) professionals
Prerequisites
- Basic knowledge in IT, including familiarity with components of IT infrastructure (i.e., networks and operating systems), IT processes and technologies.
- Basic knowledge and experience in SOC infrastructures, workflows and processes.
Learning Objectives
- Enhance skills in alert triaging (including preliminary incident response activities) and investigation workflows, focusing on managing and resolving escalated incidents.
- Gain deeper insights into cybersecurity threats and defense mechanisms, emphasizing the application of the MITRE ATT&CK Matrix for identifying attack vectors and security gaps.
- Develop leadership abilities to guide Tier 1 activities and provide operational oversight for a professional SOC environment.
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- “Swiss Army Knife” - 3Gb of IR tools
- 26 hours of practical learning experience through hands-on activities
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Cyber Threat Intelligence (6 Theoretical Hours, 2 Practical Hours)
- Introduction to Cyber Threat Intelligence (CTI)
- Introduction to OSINT
SOC Data Collection System and Methods (Tier 2 Level) (2 Theoretical Hours, 4 Practical Hours)
- Configuring Rules for Security Alerts
Efficient Alert Triage and Investigation Workflow (4 Practical Hours)
- Practicing Incident Lifecycle Management
Identifying Attack Vectors and Security Gaps (2 Theoretical Hours, 4 Practical Hours)
- MITRE ATT&CK Matrix Module 3
Introduction to forensics (4 Theoretical Hours, 6 Practical Hours)
- Incident Response and Digital Forensics
- Introduction to Windows Artifacts and Windows Registry
CTF Scenario (6 Practical Hours)
- Hands-on CTF exercise focused on investigation of incidents
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!