Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Path icon Learning Path
  • Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
  • Security

Security Analysis

4 Courses
4 Labs
7 Hours
Skill IQ

This hands-on course equips participants with advanced skills in network and system monitoring, threat detection, and analysis. Learn to monitor application services, configure alerts, and detect anomalies using tools like Wireshark and Nagios. Explore covert channel detection, DNS traffic analysis, and real-time system monitoring. Gain practical experience with file analysis, sandboxing, YARA rule creation, vulnerability scans, and network baselining. Build threat dashboards, analyze C2 communications, and create Snort rules. By integrating insights from logs and threat intelligence, participants will enhance their ability to detect, document, and escalate incidents effectively, strengthening organizational security.

Content in this path

Security Analysis

Searching and discovering potential vulnerabilities within your applications, endpoints or network is the first step of defense to keeping your environment secure. In this path, you will learn the fundamentals of vulnerability analysis and how to identify those vulnerabilities with scanning tools.

Security Analysis Labs

These labs provide a comprehensive overview of threat confirmation, focusing on identifying Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), managing false positives, and prioritizing alerts using contextual analysis. Participants will learn to create incident reports, prepare data for visualization, and build dynamic dashboards to analyze trends, detect anomalies, and map threat activity. Through hands-on exercises, students will leverage tools like Splunk, Kibana, and Wireshark to investigate user activity, endpoint logs, and network traffic, enhancing their ability to detect and respond to security incidents effectively.

Try this learning path for free
Access this learning path and other top-rated tech content with a free trial.
What You'll Learn
Prerequisites
  • A basic understanding of cybersecurity fundamentals.
Related topics
  • Network Monitoring
  • Vulnerability Analysis
  • Threat Detection
  • SOC Analyst
Not sure where to start?
With over 500 assessments to choose from, you can see where your skills stand and receive adaptive learning recommendations to fill knowledge gaps in as little as 10 minutes.
Learn more

Join our learners and upskill
in leading technologies