Skip links

Cyber Security Analyst

[ux_banner height=”400px” bg=”352″ bg_overlay=”rgba(0, 0, 0, 0.4)” parallax=”5″]

[text_box width=”80″ position_x=”50″ position_y=”50″ text_depth=”2″]

Cyber Security Training

It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.

Sun Tzu – The Art of War 

[/text_box]

[/ux_banner]
[row]

[col span=”9″ span__sm=”12″]

[title style=”bold-center” text=”Cyber Security Analyst Course”]

[tabgroup style=”tabs” nav_style=”normal” nav_size=”xlarge”]

[tab title=”Information”]

Government and enterprise organizations are facing a skyrocketing volume of sophisticated cyber threats. As these threats evolve, the need for IT security professionals who can detect and combat these threats while constructing a comprehensive security strategy grows. Cyber Security certifications validate your skills as a cybersecurity analyst, providing you with an analytical approach to cybersecurity, and knowledge of network security tools and techniques to combat threats.

What will you learn in this course?

  • Identify tools and techniques used to perform environmental reconnaissance of a target network or security system
  • Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation
  • Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack
  • Understand the use of frameworks, policies, and procedures, and report on security architecture with recommendations for effective compensating controls

Requirements:

  • IT Security Professionals must have 3-4 years of hands-on information security or related experience at the level of Network+ or Security+

Recommended Experience:

  • Knowledge of basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
  • Understanding of TCP/IP addressing, core protocols, and troubleshooting tools
  • Network attack strategies and defenses
  • Knowledge of the technologies and uses of cryptographic standards and products
  • Network- and host-based security technologies and practices
  • Standards and products used to enforce security on web and communications technologies

 

[/tab]
[tab title=”Course Outline”]

[accordion]

[accordion-item title=”Introduction”]

Duration: 1 Day / 4 hrs

  • Course Details and Objectives
  • Instructor details
  • Company Introduction (Services)
  • Threat landscape
  • Security Trends
  • Cyber security predictions -2018
  • Security Challenges
  • Security career opportunities
  • Security roles & responsibilities
  • Security Certifications
  • [/accordion-item]
    [accordion-item title=”Security Foundation”]

    Duration: 1 Day / 4 hrs

    • Difference between Information Security & Cyber Security
    • Information Security core pillars
    • Identification, Authentication, Authorization
    • Identity and Access management technologies
    • Introduction to networking concepts & Protocols
    • Packet Analysis (Wireshark)
    • Cryptography
    • Digital Signatures
    • E-mail Security
    • Identity Theft
    • [/accordion-item]
      [accordion-item title=”Security Architechture”]

      Duration: 2 Days / 4 hrs

      • Security Architecture Principles & Framework
      • Network & Security Infrastructure
      • End point Security
      • Wireless Security
      • BYOD & Mobile Security
      • Understanding App Security and risks (OWASP Top 2017)
      • Database Security

      [/accordion-item]
      [accordion-item title=”Threat and Vulnerability”]

      Duration: 3 Days / 4 hrs

      • Cyber Kill chain process
      • APT
      • Cyber Attack actors
      • Cyber Attack vectors
      • Cyber Tactics, Techniques, Procedures (TTP)
      • Vulnerability Management Framework, tools,
        techniques
      • Penetration testing principles, tools & techniques
      • Threat intelligence and hunting
      • Static and dynamic Malware Analysis
      • [/accordion-item]
        [accordion-item title=”Cyber Security Incident Management”]

        Duration: 5 Day / 8 hrs

        • Incident Detection
        • Incident Analysis (Using SIEM)
        • Incident Categorization
        • Incident Response
        • Incident Recovery
        • Preparing report and handling communication
        • Forensic (Introduction)

        [/accordion-item]
        [accordion-item title=”Soft Skills and Capabilities”]

        Duration: 6 Day / 4 hrs

        • Microsoft Technologies (Word, Excel, PowerPoint, Vision)
        • Creating reports & presentations for Business executives
        • Project management, Agile Methodology, Change
          Management
        • Day to day operations useful reference
        • Scripting & Programming language’s
        • Career guidance (Interview tips, resume writing)

        [/accordion-item]

        [/accordion]

        [/tab]
        [tab title=”Tuition Fees”]

        [row_inner]

        [col_inner span=”4″ span__sm=”12″]

        [ux_price_table title=”Online Course” price=”$3000″]

        [bullet_item text=”Cyber Security Analyst Online Course”]

        [button text=”Send Inquiry” letter_case=”lowercase” style=”outline” size=”small”]

        [/ux_price_table]

        [/col_inner]
        [col_inner span=”4″ span__sm=”12″]

        [ux_price_table title=”Classroom Course” price=”$3000″]

        [bullet_item text=”Cyber Security Analyst Classroom Course”]

        [button text=”Send Inquiry” letter_case=”lowercase” style=”outline” size=”smaller”]

        [/ux_price_table]

        [/col_inner]
        [col_inner span=”4″ span__sm=”12″]

        [ux_price_table title=”Corporate Course”]

        [bullet_item text=”Enroling at least 3 people in this course? Bring this to your preferred location as a private training”]

        [button text=”Send Inquiry” letter_case=”lowercase” style=”outline” size=”smaller”]

        [/ux_price_table]

        [/col_inner]

        [/row_inner]

        [/tab]
        [tab title=”Career Paths”]

        [accordion]

        [accordion-item title=”What does a Cyber Security Analyst do?”]

        A Security Analyst detects and prevents cyber threats to an organization.

        Every day, you will ferret out the weaknesses of your infrastructure (software, hardware and networks) and find creative ways to protect it.

        Security Analyst Responsibilities

        • Plan, implement and upgrade security measures and controls
        • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction
        • Maintain data and monitor security access
        • Perform vulnerability testing, risk analyses and security assessments
        • Conduct internal and external security audits
        • Anticipate security alerts, incidents and disasters and reduce their likelihood
        • Manage network, intrusion detection and prevention systems
        • Analyze security breaches to determine their root cause
        • Recommend and install appropriate tools and countermeasures
        • Define, implement and maintain corporate security policies
        • Train fellow employees in security awareness and procedures
        • Coordinate security plans with outside vendors

        [/accordion-item]
        [accordion-item title=”Security Analyst Career Paths”]

        The next logical career steps for a Security Analyst include:

        • Security Architect
        • Security Engineer
        • Security Manager
        • Security Consultant

        From there, you can work your way towards becoming a:

        • Security Director
        • CISO

        [/accordion-item]
        [accordion-item title=”Cyber Security Analyst Job Requirements”]

        Work Experience

        This will depend on the complexity of your organization’s security needs. The majority of job postings ask for 1-5 years of experience. Many folks with 5+ years of experience don’t want the stress of working as an Incident Responder and will opt for a lifelong career as an analyst instead. Employers are usually happy to accept them.

        Degree Requirements

        There is no firm and fast degree requirement for Security Analysts. Nevertheless, most employers are going to be looking for a bachelor’s degree in Computer Science, Cyber Security or a related field. Having said that, there are a lot of current analysts who have gone through weird and wonderful routes. If you don’t have a technical degree, you may be able to impress hiring agencies with experience, training and certifications.

        Hard Skills

        • IDS/IPS, penetration and vulnerability testing
        • DLP, anti-virus and anti-malware
        • TCP/IP, computer networking, routing and switching
        • Firewall and intrusion detection/prevention protocols
        • Windows, UNIX and Linux operating systems
        • Network protocols and packet analysis tools
        • C, C++, C#, Java or PHP programming languages
        • Cloud computing
        • SaaS models
        • Security Information and Event Management (SIEM)

        Soft Skills

        Soft skills like writing, teaching and public speaking are equally important. As part of your job, you’ll be expected to draft policies, talk over issues with upper management and explain how your security plans fit into the larger corporate picture.

        Overall, analysts are expected to be curious, creative thinkers who are deeply interested in the latest security developments and tools.

        [/accordion-item]

        [/accordion]

        [/tab]
        [tab title=”Enroll”]

        [/tab]

        [/tabgroup]

        [/col]
        [col span=”3″ span__sm=”12″]


        +1 (514) 224-7942


        training@cyforis.com

        [divider align=”center” width=”100%” height=”1px”]

        Convenient Ways to Attend This Instructor-Led Course

        Hassle-Free Enrolment: No advance payment required to reserve your seat.


        Online Training


        Classroom Training


        Corporate Training

        [divider align=”center” width=”100%” height=”1px”]

        NEW COURSES COMING SOON

        • Threat Hunting
        • Vulnerability Management
        • SIEM and Threat Intelligence
        • Security for Business
        • Security Awarness

        [/col]

        [/row]