Cybersecurity Protection of Organizations

Upskilling Course, 28 Academic Hours

Develop Knowledge of Security Principles in the Digital Arena

Cyber attacks are on the rise everywhere you look, making understanding and controlling cyber threats increasingly important to ensuring the resilience of organizations at every level.

This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. 

By enrolling in this course, you're going to learn how to handle common security incidents, familiarize yourself with common security tools, and delve into in-depth cyber defense methodologies, including the Cyber Kill Chain. Additionally, the course provides crucial insights into governance, risk management, and compliance principles vital for any organization.

Who should attend?

  • Organizational decision makers 
  • Tech-oriented employees
  • Tech and IT teams 
  • Security teams 
  • STEM students 
  • Business Administration graduates

Learning Objectives

  • Understand cybersecurity monitoring and prevention tools 
  • Develop an understanding of Incident Response plans and methodologies 
  • Become acquainted with the Vulnerability and Patch Management process 
  • Learn about different types of attacks, including tactics and techniques
  • Gain an overview of SIEM and SOAR environments 
  • Acquire experience with investigation processes, including Malware Analysis and Digital Forensics
  • Understand the “Zero Trust” security concept

What You'll Get...

Professional Supervisor and Instructors

Supervising all Wawiwa Cyber courses is Mr. Nadav Nachmias, Head of Cybersecurity Programs at Wawiwa.
The course instructors are cybersecurity professionals with hands-on experience as well as training skills. The technical level of the course can be adjusted according to the audience.
Nadav Nachmias Head of Cybersecurity Programs

Nadav Nachmias

Head of Cybersecurity Programs

Nadav is a Cybersecurity Specialist with over 15 years of experience, focusing on Cybersecurity strategies, architecture, and workforce empowerment. His practical experience made it intuitive for him to develop diverse training programs and materials in several Cybersecurity fields (including Cybersecurity Management, Incident Handling and Response, and Cyber Forensics).

What Do Graduates Have to Say?

Course Syllabus

Lesson 1: Introduction to Cybersecurity (5 hours)

  • Introduction to Cyber Defense: Case Studies of Ineffective Strategies
  • The Fundamental Role of Education and Training: Building Human Firewalls
  • Common Cybersecurity Terminology
  • Core Cybersecurity Principles
  • Cybersecurity Technologies
  • The CIA Triad

Lesson 2: Introduction to Incident Response & Social Engineering (5 hours)

  • Cyber Security Operation Center (SOC)   
  • Critical Assets 
  • Introduction to Cyberattacks
  • Threat Actors
  • Events vs. Incidents
  • Incident Response (IR) Phases
  • Cyber Kill Chain 
  • Introduction to Social Engineering
  • Social Engineering Countermeasures and Best Practices

Lesson 3: SIEM & SOAR (5 hours)

  • SIEM Concepts 
  • SIEM Functionality and Key Features
  • Top SIEM Technologies
  • SOAR: Concept and Functionality

Lesson 4: Cryptography & Cyber Controls (5 hours)

  • Introduction to Cryptography – Common Terminologies
  • Basics of Cryptography – How it works, Hash Algorithms 
  • The Concept of “Trust” in Cryptography 
  • Defining Cybersecurity Controls
  • Endpoint Security Controls – Operating Systems
  • Network Security Controls – Firewalls, IDPS, Network Access Control
  • Advanced Control Capabilities – AI/ML, Context, and Behavior Analysis

Lesson 5: Data and Service Protection, Security as a Process and Governance, Risk Management and Compliance (GRC) (5 Hours)

  • Ground-Up Security: Protecting Data and Services
  • Data Loss Prevention (DLP)
  • Application Security and Secure Software Development Life Cycle (SSDLC)
  • Identity Management and Governance
  • Disaster Recovery Planning
  • Business Continuity Strategies
  • Security as a Process: Continuous Improvement and Monitoring Tools
  • Zero Trust: Case Histories

Lesson 6: Course Recap & Final Test (3 hours)

  • Comprehensive Course Content Review
  • Final Assessment: Covering All Topics

Give your team the edge they need to succeed with our comprehensive courses, tailored to your specific needs.

Interested in more details?

We’d be happy to answer all your questions!

Partner with Wawiwa to offer tech training programs in less than 6 months!

Wawiwa bridges the tech skills gap by reskilling people for tech professions in high demand. There are millions of tech vacancies and not enough tech professionals with the relevant knowledge and skills to fill them. What the industry needs of employees is not taught in long academic degrees. Wawiwa helps partners around the world to reskill, and upskill people for tech jobs through local tech training centers or programs. The company utilizes a proven training methodology, cutting-edge content, digital platforms for learning and assessment, and strong industry relations, to deliver training programs that result in higher employability and graduate satisfaction. This, in turn, also creates a strong training brand and a sustainable business for Wawiwa’s partners.