Training of a Basic Level Monitoring Team –
Analyst Tier 1

Upskilling Course, 40 Academic Hours

Level Up to SOC Analyst Tier 1

This course is designed to provide entry-level SOC analysts with the essential knowledge and skills needed to efficiently manage the initial triage of security alerts. It covers both the administrative and operational aspects crucial for Tier 1 analysts.

By enrolling in this course, you'll develop a foundational yet robust understanding of SOC operations, particularly focusing on Tier 1 responsibilities.

Who Is This Course For?

  • IT and Cybersecurity juniors
  • Cybersecurity Analysts and Practitioners
  • Security Operations (SecOps) professionals
  • STEM Students (Year 3+)


  • Basic knowledge of IT, including familiarity with components of IT infrastructure, such as networks and operating systems.
  • Basic experience with IT processes and technologies.

Learning Objectives

  • Gain a fundamental understanding of the triage process, and basic principles of the incident handling and response processes.
  • Acquire knowledge of basic principles specific to SOC operations.
  • Understand the foundations for future advanced training, emphasizing incident handling and response processes, and digital forensics.

What You'll Get...

Professional Supervisor and Instructors

Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias Head of Cybersecurity Programs

Nadav Nachmias

Head of Cybersecurity Programs

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus

Course Preliminaries (1 Theoretical Hour)

IT Overview of OS: Windows, Linux (5 Theoretical Hours)

  • Operating Systems Basics
  • Windows Operating Systems
  • Enrichment on File systems
  • Introduction to Linux

IT Overview of Network architecture (OSI model) (4 Theoretical Hours)

  • Introduction to Networking
  • Networks and OSI model

Introduction to Attack Scenarios (MITRE ATT&CK) (2 Theoretical Hours, 6 Practical Hours)

  • The MITRE ATT&CK Matrix (Theory and Use Case Practice )

Roles and Responsibilities of the SOC (6 Theoretical Hours)

  • The Security Operation Center
  • The Technological Building Blocks of SOCs
  • Lifecycle of Cybersecurity Incidents

Cybersecurity Event Logs (Data Collection System and Methods) (4 Theoretical Hours, 12 Practical Hours)

  • Logs and Events – Security Events SIEM Rules

Parsing, Filtering, Enrichment and Storage of Data Collected

  • Embedded in earlier topics

Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.

Interested in more details?

We’d be happy to answer all your questions!

Partner with Wawiwa to offer tech training programs in less than 6 months!

Wawiwa bridges the tech skills gap by reskilling people for tech professions in high demand. There are millions of tech vacancies and not enough tech professionals with the relevant knowledge and skills to fill them. What the industry needs of employees is not taught in long academic degrees. Wawiwa helps partners around the world to reskill, and upskill people for tech jobs through local tech training centers or programs. The company utilizes a proven training methodology, cutting-edge content, digital platforms for learning and assessment, and strong industry relations, to deliver training programs that result in higher employability and graduate satisfaction. This, in turn, also creates a strong training brand and a sustainable business for Wawiwa’s partners.