Cyber Security Analyst
Dive into a comprehensive, hands-on training program designed to transform you into a job-ready cybersecurity professional. Master in-demand tools like Splunk, Tenable, AWS Security Hub, CrowdStrike, and more, across vital domains including SIEM, Vulnerability Management, Cloud Security, GRC, Threat Intelligence, and Red Teaming. With 32 intensive classes, practical labs, and a capstone project, you'll gain the skills and confidence to excel in today's dynamic threat landscape.
Prerequisites
Laptop
External monitor is a great plus ( just buy a second monitor from even fb market place)
Cyber Security Analyst
Course Content
- Overview of Cybersecurity Domains
- Key Concepts: CIA Triad, Threat Landscape, Risk Management, SIDR value, IP subnetting
- Intro to Compliance Frameworks: NIST, ISO 27001, SOC 2
- Networking Basics: Protocols, network models, VLANs, network segmentation
- Real Network Traffic Analysis
- SIEM & Logging :----------------------
- Primary Tool: Splunk
- Alternates: ELK Stack, QRadar, Wazuh, Graylog, LogRhythm
- Use Cases: Threat detection, log correlation, compliance audits, Windows/Linux log analysis, email header analysis
- Vulnerability Management :-----------
- Primary Tools: Tenable.sc, Qualys
- Alternates: Nessus, Rapid7 InsightVM, OpenVAS, Snyk
- Use Cases: Scanning, prioritization, remediation planning
- GRC (Governance, Risk, Compliance):-
- Primary Tools: ServiceNow GRC, RSA Archer
- Alternates: MetricStream, LogicGate, OneTrust
- Use Cases: Risk registers, control mapping, audit workflows
- Cloud Security :-------------------------
- Primary Tool: AWS Security Hub
- Alternates: Prisma Cloud, Azure Security Center, AWS Cloud Environment
- Use Cases: CSPM, identity and access audits, compliance checks
- Compliance Automation:-------------
- Primary Tools: Drata, Vanta
- Alternates: AuditBoard, Secureframe
- Use Cases: Evidence gathering, SOC 2 automation, dashboarding
- Endpoint Detection & Response (EDR) :---------
- Primary Tools: CrowdStrike
- Alternates: SentinelOne, Carbon Black
- Use Cases: Endpoint protection, real-, response actions
- Intrusion Detection/Prevention Systems (IDS/IPS):------
- Primary Tools: Snort, Suricata
- Alternates: None
- Use Cases: Network intrusion detection, real-time traffic monitoring
- Pen Testing Tools: Metasploit, Burp Suite, Nmap, OpenVAS, FAT RAT, Veil
- Scripting Basics: Python, PowerShell, Bash
- Adversary Simulation: MITRE ATT&CK, Cobalt Strike
- Practical Exercises: Hacking Linux and Windows 10 OS
- Platforms: TheHive, Cortex XSOAR, Splunk (as IR backend), MISP
- Forensics Tools: Autopsy, Volatility, FTK
- Malware Analysis: REMnux, Ghidra, Cuckoo Sandbox
- Use Cases: Static and dynamic malware analysis, OSINT with Shodan, incident response workflows
- Tools: Excel, Power BI, Jira, Confluence
- Skills: Writing audit reports, communicating with stakeholders, SOC analyst interview preparation, mock interviews based on real job descriptions
- Capstone: Simulated mock interview based on real job descriptions
- Key Concepts: Origins and mechanics of encryption, Public Key Infrastructure (PKI), tunneling and encapsulation
- Use Cases: Secure communication, data protection, authentication
- Key Concepts: VLAN configuration, VPN setup (OpenVPN), network segmentation, firewall fundamentals (pfSense, VyOS), wireless security
- Tools: Wireshark, tcpdump, pfSense, VyOS, OpenVPN
- Use Cases: Network traffic analysis, secure network design, packet analysis
- Linux OS:--------------------------------
- Tools: Ubuntu, Kali, Nano, Vi, Cockpit, Webmin, Ansible
- Key Concepts: Linux file system, commands, advanced Bash scripting, syslog, Journald, log rotation, task scheduling with Cron, automation with Ansible
- Use Cases: System administration, task automation, log management
- Windows OS:-----------------------------
- Tools: PowerShell Core
- Key Concepts: Windows file and log systems, log analysis, Active Directory, domain controllers, Group Policy (GPOs), LDAP, Kerberos, hybrid identity (Azure AD integration)
- Use Cases: Windows security management, authentication, policy enforcement
- Let students choose a focus:---------------------
- SIEM-heavy: Real-world SOC analysis with Splunk, ELK Stack, or Wazuh
- GRC: Risk and compliance workflows with ServiceNow GRC or RSA Archer
- Red Team: Practical hacking of Linux and Windows 10 OS using Metasploit, Nmap, or FAT RAT
- Cloud: Deploying and securing AWS environments with AWS Security Hub
- SOC Design: Design and deploy a SOC environment with TheHive and MISP
- Guided labs based on real-world cases
- Category : SIEM, Vulnerability Management, Cloud Security, GRC, Compliance Automation, EDR, Threat Intel, Pen Testing, IDS/IPS, Scripting & Automation, Network Analysis, Firewall/VPN, Virtualization
- Primary Tools : Splunk, Tenable.sc, Qualys, AWS Security Hub, AWS Security Hub, ServiceNow GRC, RSA Archer, Drata, Vanta, CrowdStrike, Recorded Future, MISP, Metasploit, Burp Suite, Nmap, Snort, Suricata, Python, PowerShell, Wireshark, tcpdump, pfSense, OpenVPN,
- Common Alternates : QRadar, ELK Stack, LogRhythm, Wazuh, Graylog, Rapid7 InsightVM, Nessus, OpenVAS, Snyk, Azure Security Center, Prisma Cloud, AWS, MetricStream, LogicGate, OneTrust, AuditBoard, Secureframe, SentinelOne, Carbon Black, ThreatConnect, Shodan, OpenVAS, OWASP ZAP, FAT RAT, Veil, Bash, Ansible, VyOS, Vagrant, Kubernetes