fbpx

SOC Tier 1 Training Programme for Cisco Cyber Ops






    download syllabus

    About the Programme

    Including preparation for the CCNA-Cyber Ops, CompTIA-CySA+ and the EC Council-ECIH certifications.

    The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centers.

    The graduates of this training shall understand the theoretical and practical components associated with their roles as SOC analysts. Therefore, the course is rich in hands-on practices which closely accompanied the theoretical topics addressed in this training.

    Students can also attempt the CCNA-Cyber Ops and / or the CompTIA-CySA+ and / or the EC Council- ECIH certifications.

    Main Features

    Date:
    May 24th 2021
    Tuition Fees:
    9,400 NIS (including registration fees and tax).
    Program Duration:
    3 Months
    Academic hours:
    80 hours
    Program Format:
    The course is held twice a week, in the evenings. There are 80 hours of in-class lectures (3 months), and 100 hours of homework assignments. Lectures are held at See-Security College in Ramat-Gan. The programme opens about three times a year
    Certifications:
    CCNA-Cyber Ops, CompTIA-CySA+ and EC Council-ECIH
    Target Audience:

    This program is designed for those who have theoretical and practical experience in system and networking, preferably with some experience in programming (python).

    Entry Requirements:

    Practical knowledge and experience in IT systems and networking. 

    Homework Assignments:
    100 Hours

    About See Security College

    See Security College is a highly specialised and international cybersecurity college. One of seven colleges of its kind, our college offers training programmes aimed for absolute beginners to more advanced professionals. The college delivers its study programs worldwide, through the See Security International brand as well as well-known governmental and special cybersecurity agencies.

    See-Security CEO, Mr. Avi Weissman is one of the leaders of the Israeli Cyber industry and serves as an advisor and commentator to the Israeli government for the regulation of cyber professions. Further, Mr. Weissman was the co-founder of the Israeli Forum for Information Security (IFIS) together with Maj. Gen. (Res.) and former head of National Security Council, Yaakov Amidror. In addition to his role in leading the college, Avi is also a co-CEO of a cyber human resources company See-HR, and a cybersecurity consulting company, See Events – Managed SIEM/SOC.

    About the Training Programme

    The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centres.

    The graduates of this training shall understand the theoretical and practical components associated with their roles as SOC analysts. Therefore, the course is rich in hands-on practices which closely accompanied the theoretical topics addressed in this training.

    SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organisation’s IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. The SOC in the job title stands for security operations centre; this is the name for the team, which consists of multiple analysts and other security pros, and often works together in a single physical location. A SOC may be an internal team serving a single enterprise or an outsourced service providing security for one or more external clients.

    SOC analyst is a job title held by infosec newbies and more experienced pros alike. The job can be a great steppingstone into a cybersecurity career.

    There are three main Tiers (or level of expertise) in this progression:

    • Tier 1 SOC analysts are triage specialists who monitor, manage, and configure security tools, review incidents to assess their urgency, and escalate incidents if necessary.
    • Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack and affected systems, and collecting data for further analysis.
    • Tier 3 SOC analysts are threat hunters,working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests, and reviewing vulnerability assessments. Some Tier 3 analysts focus more on doing deep dives into datasets to understand what is happening during and after attacks. [adapted from: Josh Fruhlinger, SOC analyst job description, salary, and certification]

    Other graduates may proceed to advanced studies in Forensics or Malware Analysis. 

    Target Audience

    The programme is aimed for students with a background in IT who wish to develop a career in SOC and Incident Response. A familiarity with OP and Networking is essential.

    Entry Requirements

    You will not be tested on these requirements for enrolment. However, we emphasise that without background knowledge, it will be difficult to keep up with materials covered throughout the course and even more challenging to pass the exams and assignments. The following are required:

    1. Practical knowledge and experience in IT systems (Linux and Microsoft) and networking.
    2. Good command of the English language
    3. Preferably: basic knowledge in python
    4. Passing an admission interview

    Pedagogical Requirements

    1. Attendance in at least 80% of the sessions
    2. A passing grade in each of the exams and assignments
    3. In technical modules – ”hands-on” practice labs in class and at home

    Programme Format

    The course is held twice a week, in the evenings. There are a total of 80 hours of in-class lectures (3 months), and 100 hours of supervised homework assignments. Lectures are .held at See-Security College in Ramat-Gan. The programme opens about three times a year

    Academic Staff

    Our lecturers live and breathe cyber with a deep knowledge of the world of IT systems and networking, and have extensive experience in establishing SOC and IR centres in Israel and abroad.

    Yaki Ben Nissan

    Head of the CSP and System Admin and Introduction to Cybersecurity programs. Educator, lecturer and Dean of Students for the Network and teleprocessing A-levels programme at Na'amat organisation. Yaki is a pioneer and an exemplary educator in the field, who has trained thousands of IT professionals and is continuously enhancing awareness for technological education among youngsters.

    Ami Zarfati, OSCP, CCE, CISO

    A senior cybersecurity professional with a focus on Malware Analysis, SOC, Incident Response, Forensic and Cyber threat intelligence. Ami has a rich experience in designing, training and implementing SIEM-SOC centers in large-scale and sensitive organisations and state agencies. Currently, Ami manages the cybersecurity monitoring center at Ben-Gurion Airport. He is a senior lecturer in our CISO program.

    Elazar Biro

    With over 12 years of experience, Elazar is an expert in incident response and SOC. As a methodologist, he is implementing and training IR teams and SOC managers. He had worked in many international organisations including the IDF and civilian companies where he formed SOC centres and implemented cybersecurity solutions.

    For more information about the advanced cybersecurity professions, check our our video:

    Certification

    A See-Security certificate will be awarded to students who fulfil the pedagogical requirement.

    Certified SOC Analyst

    External Certifications

    External Certifications

    Cisco-Cyber Ops

    Achieving the Cisco Certified CyberOps Associate certification ignites your career in cybersecurity operations. To earn the CyberOps Associate certification, you pass one exam that covers the fundamentals of cybersecurity operations, skills, and procedures.

    CompTIA-CySA+

    CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.

    EC-Council-ECIH

    The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication.