Training of a Basic Level Monitoring Team –
Analyst Tier 1
Upskilling Course, 40 Academic Hours
Level Up to SOC Analyst Tier 1
- Level: Fundamentals
This course is designed to provide entry-level SOC analysts with the essential knowledge and skills needed to efficiently manage the initial triage of security alerts. It covers both the administrative and operational aspects crucial for Tier 1 analysts.
By enrolling in this course, you'll develop a foundational yet robust understanding of SOC operations, particularly focusing on Tier 1 responsibilities.
Who Is This Course For?
- IT and Cybersecurity juniors
- Cybersecurity Analysts and Practitioners
- Security Operations (SecOps) professionals
- STEM Students (Year 3+)
Prerequisites
- Basic knowledge of IT, including familiarity with components of IT infrastructure, such as networks and operating systems.
- Basic experience with IT processes and technologies.
Learning Objectives
- Gain a fundamental understanding of the triage process, and basic principles of the incident handling and response processes.
- Acquire knowledge of basic principles specific to SOC operations.
- Understand the foundations for future advanced training, emphasizing incident handling and response processes, and digital forensics.
What You'll Get...
- Course presentation as a PDF file
- Cheat sheets and useful documentation
- “Swiss Army Knife” - 3Gb of IR tools
- ~18 hours of practical learning experience through hands-on activities
- A Wawiwa certificate upon successful completion of the course
Professional Supervisor and Instructors
Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias
Head of Cybersecurity Programs
Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).
What Do Graduates Have to Say?
Course Syllabus
Course Preliminaries (1 Theoretical Hour)
IT Overview of OS: Windows, Linux (5 Theoretical Hours)
- Operating Systems Basics
- Windows Operating Systems
- Enrichment on File systems
- Introduction to Linux
IT Overview of Network architecture (OSI model) (4 Theoretical Hours)
- Introduction to Networking
- Networks and OSI model
Introduction to Attack Scenarios (MITRE ATT&CK) (2 Theoretical Hours, 6 Practical Hours)
- The MITRE ATT&CK Matrix (Theory and Use Case Practice )
Roles and Responsibilities of the SOC (6 Theoretical Hours)
- The Security Operation Center
- The Technological Building Blocks of SOCs
- Lifecycle of Cybersecurity Incidents
Cybersecurity Event Logs (Data Collection System and Methods) (4 Theoretical Hours, 12 Practical Hours)
- Logs and Events – Security Events SIEM Rules
Parsing, Filtering, Enrichment and Storage of Data Collected
- Embedded in earlier topics
Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.
Interested in more details?
We’d be happy to answer all your questions!