Cyber Protection for Organizations

Upskilling Course, 28 Academic Hours

Develop Knowledge of Security Principles in the Digital Arena

Cyber attacks are on the rise everywhere you look, making understanding and controlling cyber threats increasingly important to ensuring the resilience of organizations at every level.

This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. 

By enrolling in this course, you're going to learn how to handle common security incidents, familiarize yourself with common security tools, and delve into in-depth cyber defense methodologies, including the Cyber Kill Chain. Additionally, the course provides crucial insights into governance, risk management, and compliance principles vital for any organization.

Who should attend?

  • Organizational decision makers 
  • Tech-oriented employees (R&D)
  • Tech and IT teams 
  • Security teams 
  • STEM students 
  • Business administration graduates

Learning Objectives

  • Get familiar with terms, regulations, and standards
  • Exposure to common procedures, concepts, and decision-making processes
  • Develop an understanding of Incident Response plans and methodologies 
  • Become acquainted with the Vulnerability and Patch Management process 
  • Introduction to cybersecurity tools and technologies 
  • Learn about different types of attacks (tactics and techniques) 
  • Overview of SIEM and SOAR environments 
  • Experience with investigation processes (Malware Analysis and Digital Forensics) 
  • Understand the “Zero Trust” concept and security framework

What You'll Get...

Professional Supervisor and Instructors

Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias Head of Cybersecurity Programs

Nadav Nachmias

Head of Cybersecurity Programs

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus

Lesson 1: Introduction to Cyber Defense (5 hours)

  • Introduction to Cyber Defense: Case Studies of Ineffective Strategies 
  • The Fundamental Role of Education and Training: Human Firewalls 
  • Real-Life Use Cases: Cyber Simulations 
  • Common Cybersecurity Terminology 
  • Cybersecurity Technologies

Lesson 2: Cybersecurity Incident-Handling Frameworks (5 hours)

  • Cyber Security Operation Center – SOC 
  • SOC Building Blocks 
  • Internal/External Communication 
  • Critical Assets 
  • Risk Assessment 
  • Events vs. Incidents 
  • NIST Framework 
  • IR Phases 
  • Introduction to Cyber Attacks 
  • Threat Actors 
  • Threat Vectors 
  • Cyber Kill Chain Attacks
  • Common Terminology

Lesson 3: Security Tools for Monitoring and Prevention (5 hours)

  • SIEM Concept 
  • Introduction to Automation and Orchestration 
  • Familiarization with The Top Technologies 
  • SOAR – “The Good, The Bad and The Ugly”

Lesson 4: Endpoint and Network Protection (5 hours)

  • Ground-Up Security: Devices 
  • Endpoint Protection 
  • Encryption: Data At Rest 
  • Ground-Up Security: Network 
  • Network Security: Firewall, IDS/IPS, Threat Analysis and Admission Control, Cloud Security 
  • Middleware Security: Content Management, Email Security, DNS Security 
  • Encryption: Data in Transit, Digital Certificates 
  • AI-Based Behavior Analysis

Lesson 5: Data and Service Protection, Security As a Process, and Governance, Risk Management, and Compliance (GRC) (5 hours)

  • Ground-up Security: Data and Services 
  • Data Loss Prevention 
  • Application Security and Secure Software Development Lifecycle (SSDLC) 
  • Identity Management and Governance 
  • Disaster Recovery 
  • Business Continuity 
  • Security As a Process: Tools for Continuous Improvement and Monitoring 
  • Execution: Key Success Factors in Deploying Defense Solutions 
  • Zero Trust Case Studies

Lesson 6: Course Recap (3 hours)

  • PollEV Recap Questionnaire

Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.

Interested in more details?

We’d be happy to answer all your questions!

Partner with Wawiwa to offer tech training programs in less than 6 months!

Wawiwa bridges the tech skills gap by reskilling people for tech professions in high demand. There are millions of tech vacancies and not enough tech professionals with the relevant knowledge and skills to fill them. What the industry needs of employees is not taught in long academic degrees. Wawiwa helps partners around the world to reskill, and upskill people for tech jobs through local tech training centers or programs. The company utilizes a proven training methodology, cutting-edge content, digital platforms for learning and assessment, and strong industry relations, to deliver training programs that result in higher employability and graduate satisfaction. This, in turn, also creates a strong training brand and a sustainable business for Wawiwa’s partners.