Dec 14, 2024  
2024-2025 Course Catalog 
    
2024-2025 Course Catalog
Add to Portfolio (opens a new window)

NET 210 - Cybersecurity Analyst

Credits: 3
Lecture Hours: 2
Lab Hours: 2
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
Cybersecurity analyst is an intermediate-level security skills and knowledge course and is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. This course builds knowledge and skills required to configure and use threat detection tools, perform data analysis and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of security and protecting applications and systems within an organization. The course will assist learners prepare for certifications like the CompTIA CySA+.
Prerequisite: NET 182 , NET 484  
Competencies
 

  1. Decide threat management methodology
    1. Implement environmental reconnaissance techniques using appropriate tools and processes
    2. Examine the results of a network reconnaissance
    3. Implement or recommend the appropriate response and countermeasure given a network-based threat
    4. Explain the purpose of practices used to secure a corporate environment
  2. Evaluate vulnerability management
    1. Implement an information security vulnerability management process
    2. Examine the output resulting from a vulnerability scan
    3. Compare and contrast common vulnerabilities found in infrastructure targets within an organization
  3. Analyze cyber incident response
    1. Distinguish threat data or behavior to determine the impact of an incident
    2. Prepare a toolkit and use appropriate forensics tools during an investigation
    3. Explain the importance of communication during the incident response process
    4. Organize common symptoms to select the best course of action to support incident response
    5. Summarize the incident recovery and post-incident response process
  4. Critique security architecture and tools sets
    1. Explain the relationship between frameworks, common policies, controls, and procedures
    2. Utilize data to recommend remediation of security issues related to identity and access management
    3. Review security architecture and make recommendations to implement compensating controls
    4. Use application security best practices while participating in the Software Development Life Cycle (SDLC)
    5. Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
  5. Evaluate common cybersecurity tools used in industry
    1. Implement preventative tools such as HIPS, Firewalls/Web Application Firewall (WAF), IPS, Antivirus/Anti-malware, EMET, and Web proxy
    2. Use network collective tools such as SIEM, network scanning, vulnerability scanning, packet capture, and command line/IP utilities
    3. Examine analytical tools such as vulnerability scanning, monitoring, and interception proxy
  6. Examine exploitation and recovery methods and tools
    1. Execute common interception and exploitive tools
    2. Use forensic suites to analyze data recovered from storage devices and memory
    3. Explain the use of hashing and why it is necessary for data integrity
    4. Use command line utilities and hardware to forensically clone storage devices
    5. Experiment with tools to crack passwords and various encryption methods

Competencies Revised Date: AY2022



Add to Portfolio (opens a new window)