Cyber Analyst (SOC)

The Google and Reichman SOC Analyst program in partnership with PwC NEXT trains our students for their first position in the Cyber security industry. A Security Operation Center (SOC) Analyst is primarily responsible for all activities that occur within the SOC. Analysts in Security Operations work with Security Engineers and SOC Managers to give situational awareness via detection, containment, and remediation of IT threats. In this course you will learn and understand how tech infrastructure is designed and operated, the key elements of IT architectures, networks, Cyber methodologies and best practices for succeeding in one of the most centered positions in every Cyber systems.

Cyber Security Fundamentals
  • Operating Systems: Windows, Linux
    • Fundamentals
    • Investigation
    • Forensics
    • Logs
  • Networking
    • Fundamentals
    • Wireshark
    • Deep Packet Inspection
    • Network Attacks
  • Organizational Services: Active Directory, Identity and Access Management, VPN

Offensive Cyber Security


  • MITRE ATTACK and Cyber Kill-chain
  • Scanning
  • Exploitations
  • Lateral movement
  • Social Engineering
  • Metasploit
  • Log analysis : Network Logs, Endpoint logs and more…
  • Alert analysis
  • Threat hunting
  • Anomaly detection
  • SOAR
  • Real Cyber attack simulation
Cyber Defense
  • Cyber security defense landscape
  • Endpoint security
  • Network security
  • API security
  • Sandbox
  • Threat Intelligence fundamentals
Incident Response (IR)
  • Incident management systems
  • Mitigation
  • Recovery
Cloud Security
  • Cloud infrastructure and technologies basics
  • Container security
  • CWPP
  • CSPM
  • DSPM
  • Real Cloud Cyber attack simulation
Embracing AI for Cyber Security
  • Threat interpretation
  • Rule generation
  • Query generation
  • Code analysis
  • Risk prioritization
  • Attack remediation
  • Incident summary
  • Red and blue team security analysis using fine tuned security LLM’s (Gemini)
  • AI powered User Entity and Behavior Analytics (UEBA) and Zero Trust monitoring and profiling in cloud environments
  • AI and LLM powered infrastructure security recommendations and guidance (Google Insights)
Enhance productivity with AI
  • Learn AI concepts: Machine Learning, Generative AI, LLM, AGI and more
  • Capabilities and limitations of current AI tools
  • Using generative AI to summarize content, learn and understand, develop and visualize ideas
  • Human-in-the-loop approach with Gen AI
  • The art of prompt engineering
  • Using Gemini in Gmail, Docs, Slides and other Google Tools
  • Learning with AI assistance: principles for effective learning
Final Project