Overview

Knowledge is transferred over the course of this 5-day period of intensive training while students will acquire skills by solving real-world cyber defense challenges, which include over 200 questions and solutions, during and after the 5-day training. These practical exercises are completed in our cyber defense lab where learners will be using the tools used by security professionals on the job. 

Note: Only available to learners from institutions in cyber talent development network.



Course description

A cyber defense analyst uses data collected from a variety of cyber defense tools (e.g. web application firewall (WAF), file integrity monitor (FIM), IDS, network firewalls, vulnerability scanner, etc.) and information systems to analyze events that occur within his/her environment for the purposes of thwarting cyber adversaries.



Prerequisite

Basic knowledge of how computers and the Internet work


Who can take this course?

  • Cyber Enthusiasts
  • IT Professionals
  • Students & Graduates
  • Cybersecurity Internship Seekers

This course includes

  • Self-paced; over 13 hours of on-demand video
  • Over 18 hours of lab exercises
  • Anytime access (from computer, tablet or mobile phone)
  • Labs and Project
  • End of Training Workshop

Key Learning Objectives

At the end of this course, learners will be able to

  • Master all learning objectives from the cyber defense associate course
  • Discuss cloud security and the shared responsibility matrix
  • Explain how a cloud access security solution works and recall the major vendors in this market space
  • Discuss the importance of a cloud security posture management solution
  • Demonstrate an understanding of key risk management terms and definitions
  • Align cyber risk management efforts with an enterprise risk management program
  • Discuss the risk assessment process
  • Describe the process of risk analysis and the expected outcome of the exercise
  • Demonstrate an understanding of risk appetite and risk tolerance
  • Recall key considerations related to the crafting of a risk assessment report
  • List and explain each of the four common risk response actions
  • Outline the importance of risk monitoring and demonstrate an understanding of the process
  • Recall elements of cyber security governance
  • List and discuss motivations for cyber defense
  • Demonstrate basic understanding of the functions of a cyber security steering committee
  • Explain the role of the compliance function in cyber defense
  • Demonstrate good understanding of the role of Internal Audit in cyber defense


Course Curriculum

  SECTION 1 - THE NICE FRAMEWORK AND CYBER SECURITY ESSENTIALS
Available in days
days after you enroll
  SECTION 2 - CYBER THREATS, VULNERABILITIES AND ATTACKS
Available in days
days after you enroll
  SECTION 3 – PROTECTIVE CYBER SECURITY TECHNOLOGIES
Available in days
days after you enroll
  SECTION 4 - ELEMENTS OF A SECURITY OPERATIONS CENTER (SOC)
Available in days
days after you enroll
  SECTION 5 – CYBER RISK MANAGEMENT, LAWS, AND GOVERNANCE
Available in days
days after you enroll
  SECTION 6 - INCIDENT RESPONSE SCENARIOS
Available in days
days after you enroll
  Wrap up
Available in days
days after you enroll

Cyber Defense Lab


Our lab environment closely mirrors the real-world business environment where students get to play the role of a cyber security professional.

20 Unique Cyber Security Challenges!


Solve real world cyber security challenges by following structured incident response steps

Choose a Pricing Option

Only available to learners from institutions in cyber talent development network.


$1,249

Cyber Defense Analyst - Blended University Edition

Accelerate knowledge retention and skill development through blended learning whilst gaining the knowledge, skills, abilities, competence and confidence required to join the global cyber security workforce.

Self-paced and instructor led learning modes take place over a period of six (6) weeks during which students get to complete the knowledge and skills part of the course.

Students acquire skills by solving real-world cyber defense challenges, which include over 200 questions and solutions. In the two weeks following the 6-week period, students will work collaboratively (5 students per group) to complete a cyber defense project , which is based on real-life cyber security incidents.

Total course duration is 8 weeks.