(115)
3 months
, Beginner
The School Of
Build expertise in security analysis, security engineering, enterprise security, security architecture, ethical hacking, and data privacy. With the skills you learn in our cybersecurity courses, you can launch or advance a successful career in the field.
Cybersecurity training helps learners identify, correct, and respond to security weaknesses and incidents through open-ended projects that mimic workplace security challenges. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures.
Steps To Become A Security Analyst
(115)
3 months
, Beginner
Step 1
(115)
3 months
, Beginner
Skills Covered
Threat intelligence, Cryptography, Cybersecurity fluency, Security auditing, Vulnerability management, Cybersecurity grc, Cybersecurity business context, Security information and event management, Systems security, Cybersecurity compliance, Cybersecurity risk management, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Identity and access management fundamentals, Patch management, Security architecture fundamentals, Cybersecurity policy writing, Stakeholder management, Value-based security risk assessment, Security risk classification, Cybersecurity standards fluency, Security risk remediation, Cybersecurity training strategies, Offensive security, Intrusion protection systems, Firewall rules, Nist 800-series, Firewalls, Data security fundamentals, Network security best practices, Intrusion detection systems, Did framework, Computer networking basics, Network security reports, Cybersecurity governance, Nist cybersecurity framework, Cybersecurity regulations and standards, Exploit detection, Data privacy regulations, Cis controls, Email security
Learn More(27)
3 months
, Intermediate
Step 2
(27)
3 months
, Intermediate
Skills Covered
Intrusion detection systems, Threat modeling, Splunk, Security information and event management, Vulnerability assessment, Security risk classification, Did framework, Cybersecurity controls, Cybersecurity incident response playbooks, Security assessment, Snort ids, Logging, Cybersecurity incident remediation, Network traffic capture, Vulnerability lifecycle, Security risk mitigation, Penetration testing, Vulnerability mitigation, Technical communication, Threat actors, Internal threat mitigation, Cybersecurity fluency, Owasp top-10, Cybersecurity ttps, Patch management, External threat mitigation, Network attack vectors
Learn More(17)
2 months
, Advanced
Step 3
(17)
2 months
, Advanced
Skills Covered
Report writing, Cybersecurity reconnaissance, Open-source intelligence, Owasp wstg, Digital footprint removal, Password attacks, Osint tools, Vulnerability management, Exploit code execution, Metasploit, Link analysis, Open source vulnerability database, Digital footprint analysis, SQL injection, Cybersecurity pivoting, Web hacking, Cherrytree, Backdoors, Passive cybersecurity reconnaissance, Vulnerability assessment, Social engineering, Phishing, Gophish, Security risk classification, Nessus, Security assessment, On-premise cyber attacks, Service enumeration, Advanced persistent threat, Steganography, Owasp zap, Active cybersecurity reconnaissance, Data exfiltration, Nmap, Dig, Router hacking, Privilege escalation, Traceroute, Dirb, Netdiscover, Red teaming, Port scanning, Nslookup, John the ripper, Wpscan, Cyber attack persistence, Keystroke logging, Port forwarding, Web application vulnerability scanning, Vulnerability exploitation, Cvss, Hash cat, Vulnerability scanning, Exploitdb, Veil-evasion, Burp suite, Google hacking, Cybersecurity ttps, SQLmap, Maltego, Malware development, Automated penetration testing, Semi-automated penetration testing, Exploratory data analysis, Nikto, Vulnerability research
Learn More(115)
3 months
, Beginner
(17)
2 months
, Advanced
(32)
4 months
, Intermediate
(9)
3 months
, Intermediate
(27)
3 months
, Intermediate
Finance
Retail
Technology
Defense
Get Started Today