Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out

Cybersecurity Analyst

Course Summary

The Cybersecurity Analyst course provides a comprehensive and practical foundation in the core skills of a cybersecurity analyst. It is designed for IT professionals who are looking to transition into or advance their careers in security operations. The curriculum focuses on hands-on application of concepts, with a strong emphasis on real-world scenarios, tools, and methodologies.

Prerequisites
In order to succeed in this course, participants will need:

  • Understanding of networking concepts (TCP/IP, protocols) and operating systems (Windows and Linux)
  • Familiarity with general security principles
  • Experience in IT support or administration recommended but not required
Purpose
Learn the core skills of a Cybersecurity Analyst
Audience
IT professionals interested in learning about security operations
Role
Early career IT professionals |System Administrators | Network Engineers | Cybersecurity professionals seeking to formalize their knowledge in security operations
Skill level
Introduction
Style
Lecture | Hands-on activities | Labs
Duration
3 days
Related technologies
Networking

 

Learning objectives
  • Perform security operations and monitoring to identify malicious activity
  • Conduct vulnerability management and analysis
  • Execute a structured incident response and recovery plan
  • Understand and apply principles of governance, risk, and compliance

What you'll learn:

In this Cybersecurity Analyst course, you'll learn:

Security Operations and Threat Intelligence

  • Role of a cybersecurity analyst in security operations and SOC environments
  • System and network architecture for security
  • Analyzing malicious activity and threat hunting
  • Threat intelligence sources and methods
  • Core security tools: SIEM, EDR, SOAR
  • Security operations processes and workflows

Vulnerability Management and Analysis

  • Vulnerability scanning methods and approaches
  • Industry frameworks for prioritization (CVSS, EPSS)
  • Mitigation strategies and security controls
  • Secure Software Development Life Cycle (SDLC)
  • Attack surface management practices

Incident Response and Recovery

  • Attack methodology frameworks (Cyber Kill Chain, MITRE ATT&CK)
  • The incident response lifecycle and six-step process
  • Digital forensics fundamentals
  • Playbooks and security automation
  • Business continuity and disaster recovery strategies

Governance, Risk, and Compliance (GRC)

  • Principles of governance, risk, and compliance
  • Security frameworks and regulations (NIST, ISO, GDPR, etc.)
  • Risk management processes
  • Security reporting and communication
  • Building a strong cybersecurity culture

Dive in and learn more

When transforming your workforce, it’s important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.