- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Core Tech
Cyber Defense Analyst | Work Role ID: 511 (NIST: PD-WRL-001)
A **cyber defense analyst** uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
This path will get you started on your journey to becoming a cyber defense analyst! Begin with the fundamental concepts of networking and cyber literacy through hands-on labs, dive into the essential skills necessary to perform the day-to-day functions of a cyber defense analyst and then expand your skill set with, automation, deeper/advanced concepts and additional knowledge from adjacent roles!
This path aligns to the Knowledge, Skills, Abilities and Tasks (KSAs) within the **Workforce Framework for Cybersecurity (CSWF)** and the **DoD Cyber Workforce Framework (DCWF)** for the work role of:
**Cyber Defense Analyst** Work Role 511 or PD-WRL-001
Content in this path
Fundamentals
Begin your learning journey with the fundamental concepts of networking and security!
Skill Essentials
Now that you know the fundamentals, dive into the essential skills necessary to perform the day-to-day functions of a cyber defense analyst including network analysis, and security event triage!
Expanded Skillset
It's time to expand your skill set with tools, and more advanced concepts! This section gives you a brief introduction into many, additional skills that you will find helpful as a cyber defense analyst. We have full training paths on all of these skills; see the Supplemental Skill Paths section to learn more.
Adjacent Skill Knowledge
Now that you've mastered all the skills for a cyber defense incident responder, learn about additional cyber roles and their responsibilities.
Try this learning path for free
What You'll Learn
- None
- dcwf
- nice framework
- cyber security
- information security