Messagefirst coursesecond courseJust a message
Including preparation for the CCNA-Cyber Ops, CompTIA-CySA+ and the EC Council-ECIH certifications.
The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centers.
The graduates of this training shall understand the theoretical and practical components associated with their roles as SOC analysts. Therefore, the course is rich in hands-on practices which closely accompanied the theoretical topics addressed in this training.
Students can also attempt the CCNA-Cyber Ops and / or the CompTIA-CySA+ and / or the EC Council- ECIH certifications.
May 24th 2021
9,400 NIS (including registration fees and tax).
The course is held twice a week, in the evenings. There are 80 hours of in-class lectures (3 months), and 100 hours of homework assignments. Lectures are held at See-Security College in Ramat-Gan. The programme opens about three times a year
CCNA-Cyber Ops, CompTIA-CySA+ and EC Council-ECIH
This program is designed for those who have theoretical and practical experience in system and networking, preferably with some experience in programming (python).
Practical knowledge and experience in IT systems and networking.
See Security College is a highly specialised and international cybersecurity college. One of seven colleges of its kind, our college offers training programmes aimed for absolute beginners to more advanced professionals. The college delivers its study programs worldwide, through the See Security International brand as well as well-known governmental and special cybersecurity agencies.
See-Security CEO, Mr. Avi Weissman is one of the leaders of the Israeli Cyber industry and serves as an advisor and commentator to the Israeli government for the regulation of cyber professions. Further, Mr. Weissman was the co-founder of the Israeli Forum for Information Security (IFIS) together with Maj. Gen. (Res.) and former head of National Security Council, Yaakov Amidror. In addition to his role in leading the college, Avi is also a co-CEO of a cyber human resources company See-HR, and a cybersecurity consulting company, See Events – Managed SIEM/SOC.
The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centres.
A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organisation’s IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. The SOC in the job title stands for security operations centre; this is the name for the team, which consists of multiple analysts and other security pros, and often works together in a single physical location. A SOC may be an internal team serving a single enterprise or an outsourced service providing security for one or more external clients.
SOC analyst is a job title held by infosec newbies and more experienced pros alike. The job can be a great steppingstone into a cybersecurity career.
There are three main Tiers (or level of expertise) in this progression:
Other graduates may proceed to advanced studies in Forensics or Malware Analysis.
The programme is aimed for students with a background in IT who wish to develop a career in SOC and Incident Response. A familiarity with OP and Networking is essential.
You will not be tested on these requirements for enrolment. However, we emphasise that without background knowledge, it will be difficult to keep up with materials covered throughout the course and even more challenging to pass the exams and assignments. The following are required:
The course is held twice a week, in the evenings. There are a total of 80 hours of in-class lectures (3 months), and 100 hours of supervised homework assignments. Lectures are .held at See-Security College in Ramat-Gan. The programme opens about three times a year
Our lecturers live and breathe cyber with a deep knowledge of the world of IT systems and networking, and have extensive experience in establishing SOC and IR centres in Israel and abroad.
Head of the CSP and System Admin and Introduction to Cybersecurity programs. Educator, lecturer and Dean of Students for the Network and teleprocessing A-levels programme at Na'amat organisation. Yaki is a pioneer and an exemplary educator in the field, who has trained thousands of IT professionals and is continuously enhancing awareness for technological education among youngsters.
A senior cybersecurity professional with a focus on Malware Analysis, SOC, Incident Response, Forensic and Cyber threat intelligence. Ami has a rich experience in designing, training and implementing SIEM-SOC centers in large-scale and sensitive organisations and state agencies. Currently, Ami manages the cybersecurity monitoring center at Ben-Gurion Airport. He is a senior lecturer in our CISO program.
With over 12 years of experience, Elazar is an expert in incident response and SOC. As a methodologist, he is implementing and training IR teams and SOC managers. He had worked in many international organisations including the IDF and civilian companies where he formed SOC centres and implemented cybersecurity solutions.
For more information about the advanced cybersecurity professions, check our our video:
A See-Security certificate will be awarded to students who fulfil the pedagogical requirement.
Certified SOC Analyst
Achieving the Cisco Certified CyberOps Associate certification ignites your career in cybersecurity operations. To earn the CyberOps Associate certification, you pass one exam that covers the fundamentals of cybersecurity operations, skills, and procedures.
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication.