Cybersecurity Analyst

Competency-based occupation
Onet code: 15-1212.00

1

Years

20

Skills

477h

Related instruction
Classroom Instruction Topics
  • Analyze Various Data Sources to Confirm Suspected Infection
  • CompTIA Linux+
  • CompTIA Linux+ LX0-103
  • CompTIA LX0-103: Linux+
  • CompTIA Linux+ LX0-104
  • Scanning and Mapping Networks
  • Firewall Set-up and Configuration
  • Setting up Zones in a Firewall
  • Block Incoming Traffic Known Port
  • Network Miner
  • CompTIA Network+
  • CompTIA Network+ N10-007
  • CompTIA - N10-007 Network+
  • Preliminary Scanning
  • Open Systems Interconnection model (OSI model)
  • TCP/IP
  • Network Devices
  • Comparing Controls
  • Cisco CCNA
  • Cisco Certified Network Associate (CCNA 200-125)
  • Intro to InfoSec
  • CompTIA Security+
  • CompTIA Security+ 501
  • CompTIA SY0-501: Security+
  • Penetration Testing and Ethical Hacking
  • Certified Ethical Hacker (CEH)
  • Ethical Hacking (CEH Preparation)
  • Open Source Password Cracking
  • Intro to Malware Analysis and Reverse Engineering
  • Participate in Attack Analysis Using Trusted Tool Set
  • Cross Site Request Forgery (CSRF)
  • Cross Site Request Forgery (CSRF) Defend
  • Web Application Penetration Testing
  • XSS Store Based Fishing
  • XSS Stored
  • XSS Reflected
  • Incident Response and Advanced Forensics
  • Botnet Takedown
  • Network Discovery
  • Parse Files Out of Network Traffic
  • Specialized Linux Port Scans
  • Using Snort and Wireshark to Analyze Traffic
  • Threat Designation
  • Fundamental Vulnerability Management
  • Applying Filters to TCPDump and Wireshark
  • Security Assessment & Testing
  • Identifying System Vulnerabilities with OpenVAS
  • Implement Single System Changes in Firewall
  • Manual Vulnerability Assessment
  • Performing an Initial Attack Analysis
  • Advanced Techniques for Malware Recovery
  • Analyze and Classify Malware
  • Dynamic Malware Analysis Capstone
  • CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA CySA+
  • Vulnerability Scanner Set-up and Configuration
  • Vulnerability Scanner Set-up and Configuration, Pt. 2
  • Monitoring Network Traffic
  • Analyze SQL Injection Attack
  • Creating Recommendations Based on Vulnerability Assessments
  • Advanced Penetration Testing
  • Denial of Service PCAP Analysis
  • Centralized Monitoring
  • Computer and Hacking Forensics
  • Metasploit
On-the-job Training
  • General Practices - Foundations
    • Demonstrate a working understanding of the organization's structure, personnel rules, responsibilities, and general understanding of work ethics, interpersonal communications, and related policies. Understands and practices safety procedures and rules.
    • Demonstrate a working understanding of the organization's goals, mission, and vision.
    • Demonstrate a working understanding of the organization's office tools such as copiers, fax machines, etc.
    • Demonstrate a working knowledge of the components of a computer and perform basic troubleshooting on communication issues within a computer
    • Demonstrate a working knowledge of the hardware components of a computer and perform basic troubleshooting on hardware related issues.
  • General Practices - Computer Basics
    • Demonstrate a working knowledge of the Microsoft Office suite and basic troubleshooting on a computer.
    • Demonstrate a basic knowledge of troubleshooting, networking, and security across a variety of devices.
    • Demonstrate a basic knowledge of the cloud components of a network and perform basic troubleshooting on hardware related issues.
    • Demonstrate a basic knowledge of "best practices" in general network security
  • General Practices - Security Basics
    • Demonstrate a basic knowledge of "best practices" in managing Linux networks.
    • Demonstrate a fundamental knowledge of "best practices" in general network security
  • General Practices - Advanced Networking
    • Demonstrate a fundamental knowledge of basic networking, to allow the flow of information between multiple computers. Install and configure client operating systems for the organization
    • Demonstrate a working knowledge of how to configure and troubleshoot network operating systems
    • Demonstrate a working knowledge of how to configure and troubleshoot Active Directory
    • Demonstrate a working knowledge of how to configure and troubleshoot identity and access solutions
  • General Practices - Advanced Networking Cont.
    • Demonstrate a working knowledge of how to configure and troubleshoot IIS and terminal services
    • Plan and administer Windows Server 2008R2 or newer
    • Design a Windows Server 2008R2 or newer Network Infrastructure
    • Design a Windows Server 2008R2 or newer Active Directory Infrastructure
  • General Practices - Advanced Security
    • Demonstrate a basic knowledge of best practices in cryptography, end user management, penetration testing, data forensics, malware, NIST standards, metas-loot, end-user management, threat responses, social engineering, and corporate security management be
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly