CYBERSECURITY Advance Program, Security Operations Center Analyst

  • Module-1: Basics of network operations and mechanisms

    • Physical and logical layers
    • Protocols and IP, Sniffing, TCP, UDP, DNS
    • How does the traffic flow?
    • Governance, Flow of traffic and SMTP
    • Live Lab-exercises
  • Module-2: Fundamentals of network attack methods

    • Components, and attack mechanisms
    • Attacker objectives, capabilities
    • Attacker methods and mechanisms
    • Defender’s viewpoints and objectives
    • Attack methodologies
    • Starting position and attack progression
    • Passive and active attack tools
    • Design basis threat
    • Live Lab-exercises
  • Module-3: Essentials of network attack detection mechanisms

    • The magnitude of the problemy
    • Attacks on Vs. through networks
    • Detecting known attack sequences
    • Live Lab-exercises
  • Module-4: Automated detection tools, and operational methodologies

    • A general approach to detection
    • Loss of accountability
    • Detection and response in a NOC
    • Live Lab-exercises

Overview: Operations Center Analyst

The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and more. Cybersecurity has become increasingly critical in the cyber-age.

Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations. Attacks are getting more sophisticated, more frequent, and reaching more people around the world. That makes it important for you to become aware of the effects of cybersecurity issues


Organizations are losing millions of dollars to network attacks. They are fighting back by hiring Cybersecurity experts.


Demand for Cybersecurity experts far exceeds supply. That means less competition and more salary for experts.


3.5 million unfilled Cybersecurity jobs projected by 2022 and Cybersecurity jobs are not going away anytime soon.


Benefits of this program

  • Kickstart or re-kindle your career: This is an “Outcome-based training” with a focus on employability, designed to prepare you for employment opportunities to work at a Security Operations Centre (SOC/NOC)
  • Learn from the best in the world expert instructor, who earned thetitle “Father of the Computer Virus” and devised defenses used in more than 80% of computers worldwide
  • Get practical insights from an (ISC)² Fellow, with over 40 years of experience in the cybersecurity industry and academia
  • Real-life use-cases and case studies to give you practical insights
  • Receive a Certificate upon successfully completing the course
  • Learn by doing: Access iZen’s cyberlabs for lab exercises to reinforce the understanding of concepts. Get hands-on experience

Who is this Program for

  • If you are a student seeking employment to kickstart your career, this is a great opportunity for you to build a rewarding, future-proof, and meaningful career
  • If you are already employed but are trying to rekindle your career in the exciting world of cybersecurity, this program is perfect for you


  • Basic knowledge of computers and networking. No programming skills needed

From whom will you learn?


Dr. Fred Cohen has over 40 years of experience building companies and supporting risk management and strategic decision making for enterprises of all sizes. He is globally recognized as an innovative expert in information protection and cybersecurity. He is one of the only 20 Cybersecurity experts in the world, recognized as a fellow of (ISC)² at “Cybersecurity and IT Security Certifications and Training”. Dr. Cohen works closely with global experts to help bring knowledge of all things Cyber to program attendees from around the world.

LinkedIn profile:

The more detailed profile can be found at


Dr. Cohen has a long history of being ahead of the curve:

  • Won several international awards for his work in Cybersecurity
  • Led the team that defined the information assurance problem as it relates to critical infrastructure protection
  • Did seminal research in the use of deception for information protection
  • His “Deception for Protection” series of papers is widely cited, and the techniques he pioneered are now in global use
  • A leader in advancing the science of digital forensic evidence examination
  • Top-flight information protection consultant and industry analyst for many years
  • Authored more than 200 invited, refereed, and other scientific and management research articles
  • Wrote monthly articles on cyber since 1995 and wrote several books on information protection
  • His “Enterprise Information Protection Architecture”, “Challenges to Digital Forensic Evidence”, and “Digital Forensic Evidence Examination” are used in graduate classes and other venues worldwide
  • Leading security practitioners around the globe have used his “Chief Information Security Officers ToolKit” series of books and booklets
  • His “Frauds Spies and Lies and How to Defeat Them” book has been the subject of radio talk shows
  • The research community has widely used his series of “Infosec Baseline” studies as stepping off points for further research
  • His “50 Ways” series is very popular among practitioners looking for issues to be addressed
  • His “World War 3 .Information Warfare Basics” is highly regarded among the thinkers in this arena
  • Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
  • Taught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil matters
  • Was named the “most famous hacker” of all time by ABC News in 2009


How Will You Learn?

  • Online using desktop, laptop or mobile devices
  • Learn at your own convenient time, and pace
  • Video lectures delivered from a cloud LMS platform
  • Quizzes are given remotely
  • Hands-on projects, and industry case studies for the reinforcement of the learning

What is the Duration of The Program

  • A total of around 60-75 hours depending on your background/experience
  • The course can be completed in 8-weeks to 12-weeks depending on how much time you can dedicate per week for this course
AED 3,699.00
AED 3,699.00
About this course:



24 Modules


12 weeks




Webster University

Make a Course Enquiry