Course Type *Cyber Security Preparation Programme (CSPP)SOC AnalystCyber Security Practitioner (CSP)Cyber Security Penetration Testing (HDE)Cyber Security Technology Professional (CSTP)Cyber Security Methodology Professional (CSMP)Chief Information Security Officer (CISO)Courses for OrganizationsInternational CoursesJust a message
Including preparation for the CCNA-Cyber Ops, CompTIA-CySA+ and the EC Council-ECIH certifications.
The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centers.
The graduates of this training shall understand the theoretical and practical components associated with their roles as SOC analysts. Therefore, the course is rich in hands-on practices which closely accompanied the theoretical topics addressed in this training.
Students can also attempt the CCNA-Cyber Ops and / or the CompTIA-CySA+ and / or the EC Council- ECIH certifications.
Ask our staff
The course is held twice a week, in the evenings. There are 50 hours of in-class lectures (2 months), and 100 hours of homework assignments. Lectures are held at See-Security College in Ramat-Gan. The programme opens about three times a year
CCNA-Cyber Ops, CompTIA-CySA+ and EC Council-ECIH
This programme is designed for those who have theoretical and practical experience in system and networking, preferably with some experience in programming (python).
Practical knowledge and experience in IT systems and networking.
See Security College is a highly specialised and international cybersecurity college. One of seven colleges of its kind, our college offers training programmes aimed for absolute beginners to more advanced professionals. The college delivers its study programmes worldwide, through the See Security International brand as well as well-known governmental and special cybersecurity agencies.
See-Security’s CEO, Mr. Avi Weissman is one of the leaders of the Israeli cyber industry and serves as an advisor and commentator to the Israeli government for the regulation of cyber professions. Further, Mr. Weissman was the co-founder of the Israeli Forum for Information Security (IFIS) together with Maj. Gen. (Res.) and former head of the National Security Council, Yaakov Amidror. In addition to his role in leading the college, Avi is also a co-CEO of a cyber human resources company, See-HR and a cybersecurity consulting company, See Events – Managed SIEM/SOC.
See-Secure is an information security consultancy company specializing in Managed SIEM- SOC, Cyber security architecture, IT regulatory compliance and standards, secure designing of information systems, IT risk management, Business Continuity Management and Disaster Recovery Planning.
Our Consulting Division of our company provides solutions for information security requirements, including the information security regulations on varied sectors Financial, Health Care, Critical Infrastructure, Insurance and more.
Our consulting division is known internationally for its security experts, jurisdiction and international capabilities. Business knowledge accumulated in the Consulting Division provides our clients with the professional solutions at the highest quality, while applying the experience accumulated worldwide.
The domains covered in this comprehensive training programme relates to the core skills and knowledge you need to know to working and operating a SOC & IR centres.
A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organisation’s IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. The SOC in the job title stands for security operations centre; this is the name for the team, which consists of multiple analysts and other security pros, and often works together in a single physical location. A SOC may be an internal team serving a single enterprise or an outsourced service providing security for one or more external clients.
SOC analyst is a job title held by infosec newbies and more experienced pros alike. The job can be a great steppingstone into a cybersecurity career.
There are three main Tiers (or level of expertise) in this progression:
The programme is aimed for students with a background in IT who wish to develop a career in SOC and Incident Response. A familiarity with OP and Networking is essential.
You will not be tested on these requirements for enrolment. However, we emphasize that without background knowledge it will be difficult to keep up with materials covered throughout the course and even more challenging to pass the exams and assignments. The following are expected:
The course is held twice a week, in the evenings. There are a total of 50 hours of in-class lectures (2 months), and 100 hours of supervised homework assignments. Lectures are .held at See-Security College in Ramat-Gan. The programme opens about three times a year
Our lecturers live and breathe cyber with a deep knowledge of the world of IT systems and networking and have extensive experience in establishing SOC and IR centres in Israel and abroad.
For more information about the advanced cybersecurity professions, check our our video:
A See-Security certificate will be awarded to students who fulfil the pedagogical requirement.
Certified SOC Analyst
Achieving the Cisco Certified CyberOps Associate certification ignites your career in cybersecurity operations. To earn the CyberOps Associate certification, you pass one exam that covers the fundamentals of cybersecurity operations, skills, and procedures.
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats through continuous security monitoring.
The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication.