College Original

Cybersecurity Analyst Certificate

San Diego Continuing Education

Online - ScheduledType
Apr 22, 2021Enrollment Deadline
Apr 26, 2021 - Nov 5, 2021Course Dates
30 AvailableTotal Seats

Course Details

This three-course certificate program covers cybersecurity. In the first course, students will learn about cybersecurity threats and vulnerability assessments and remediation. In the first course, students employ threat assessments to select the appropriate controls to secure a network or system. Students use tools for environmental and network reconnaissance, and apply techniques to minimize their impact. Topics include reconnaissance analysis and corporate security practices. Students also design and use a vulnerability management program to identify, prioritize, and remediate organizational vulnerabilities.

The second course covers cybersecurity incident response planning, tools, and techniques. Students will build a formal incident response handling program. Students use tools to contain, cleanup, recover and prepare a post incident report. Topics include forensic tools, their appropriate use, and analysis of the symptoms of an incident. The purpose and importance of communication and role-based responsibilities will be integrated throughout the course.

The third course covers cybersecurity architecture and tools. Students will use tools and guidelines to build a set of security policies and procedures. Students will also design a layered security architecture and analyze it for flaws. Topics include security frameworks, policies, and controls used for remediation. Students use industry standards for software security. The review, selection, and assembly of tools for performing threat and incident management will also be covered.

Course Benefits:
  • Live face-to-face classes
  • Collaborative project-based learning
  • 24-hour tutoring
  • Live counseling available
  • 24-hr library services
  • Career Counseling
  • Professional development
  • High quality professionally designed courses
  • No textbook fees
After This Course, You Will Be Able To

Upon successful completion of the first course, you will be able to:
1. Describe the roles and responsibilities of cybersecurity analysts
2. Apply environmental reconnaissance techniques using appropriate tools and processes
3. Analyze the results of a network reconnaissance
4. Given a network-based threat, implement or recommend the appropriate response and countermeasure
5. Explain the purpose of practices used to secure a corporate environment
6. Implement an information security vulnerability management process
7. Configure vulnerability scanning tools and analyze resulting output
8. Compare and contrast common vulnerabilities found within an organization
9. Describe the major steps associated with a typical penetration testing process
10. Analyze the environment and outline its vulnerability management requirements

Upon successful completion of the second course, you will be able to:
1. Describe the roles and responsibilities of cybersecurity analysts
2. Apply environmental reconnaissance techniques using appropriate tools and processes
3. Analyze the results of a network reconnaissance
4. Given a network-based threat, implement or recommend the appropriate response and countermeasure
5. Explain the purpose of practices used to secure a corporate environment

Upon successful completion of the third course, you will be able to:
1. Describe the roles and responsibilities of cybersecurity analysts
2. Apply environmental reconnaissance techniques using appropriate tools and processes
3. Analyze the results of a network reconnaissance
4. Given a network-based threat, implement or recommend the appropriate response and countermeasure
5. Explain the purpose of practices used to secure a corporate environment
6. Implement an information security vulnerability management process
7. Configure vulnerability scanning tools and analyze resulting output
8. Compare and contrast common vulnerabilities found within an organization
9. Describe the major steps associated with a typical penetration testing process
10. Analyze the environment and outline its vulnerability management requirements

Skills you will learn

Reading ComprehensionCritical ThinkingActive ListeningComplex Problem SolvingSpeaking
View all skills

Knowledge Outcomes and Experience

Jobs & Careers
Information Security Analysts

Eligibility

Required Skills: 

  • Possess a 12th grade reading level
  • Ability to communicate effectively in the English language
  • Knowledge of math concepts at the 8th grade level
  • Computer literacy

*California residents are eligible for no-cost courses and certificate programs. Please visit sdce.edu for more information.

Additional Attendance Information

This certificate program has the following breaks:

  • 6/5/2021 to 7/11/2021
  • 8/21/2021 to 9/26/2021

Schedule

Wednesday 08:00 PM - 09:30 PM

Related Courses

Cover photo$891.09
Similar Available CoursesExplore other similar courses that align with your interests and career goals.
Need Help Choosing?Compare courses side by side to help you choose the right one for your learning journey!
Similar Available CoursesExplore other similar courses that align with your interests and career goals.
Need Help Choosing?Compare courses side by side to help you choose the right one for your learning journey!