Skip to content
logo logo
  • Home
  • About Us
  • Courses
  • Gallery
  • Blog
  • Services
  • Contact Us
Whatsapp

H |…

  • Home
  • Course
  • H | Cybersecurity Analyst (H | CA)

H | CA (Cybersecurity Analyst)

Students enrolled in the Cybersecurity Analyst course will be equipped with the skills necessary to monitor and defend organizational assets from cyber threats in the workplace. In order to maintain the security posture of contemporary companies, this course places a strong emphasis on practical skills in threat detection, incident response, and vulnerability assessment.

Duration : 3 months 
Module 1:  Introduction to Cybersecurity Tools & Cyberattacks
    1. What is Cyber Security?

    2. Importance of Cyber Security

    3. Cyber Security Domains

    4. CIA Triad

    5. Vulnerability, Threat and Risk

    6. Understand authentication and identity management concepts for safeguarding your organization

  •  
Module 2: Operating Systems: Overview, Administration, and Security
    1. Essential OS knowledge for professionals looking to get started in cybersecurity and IT support

    2. Manage Users and Groups

    3. Manage File/Folder Permissions

    4. Command Line

    5. Special Permissions

    6. Disk Management

    7. Service and Process Management

  •  
Module 3: Cybersecurity Compliance Framework, Standards & Regulations
    1. Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.

    2. Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.

    3. Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.

    4. Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

    5. Security devices and software, Security Standards, Compliances & Protocols.

    6. Understanding of Computer Networks, Network Security and Network Devices. Ability to identify and mitigate network vulnerabilities and explain how to avoid them.

    7. Experience with computer network penetration testing and techniques.

    8. Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts

  •  
Module 4: Threat Management 
    1. Reconnaissance techniques using appropriate tools and processes.

    2. Analyze the results of a network reconnaissance

    3. Network-based threat, implement or recommend the appropriate response and countermeasure.

    4. Monitor network traffic, System logs and security alerts to detect

    5. Analyze potential security threats, such as malware, intrusions, and unauthorized access

Module 5: Vulnerability Management and Assessment 
    1. Implement an information security vulnerability management process.

    2. Analyze the output resulting from a vulnerability scan.

    3. Compare and contrast common vulnerabilities found in the following targets within an organization.

    4. Identify vulnerabilities in software, hardware and Network Configurations

    5. Patches and Security Updates 

Module 6 : Cyber Incident Response
    1. Implement an information security vulnerability management process.

    2. Analyze the output resulting from a vulnerability scan.

    3. Develop and execute incident response plans to address and mitigate security incidents

    4. Prepare a toolkit and use appropriate forensics tools during an investigation.

    5. Analyze common symptoms to select the best course of action to support incident response.

    6. Summarize the incident recovery and post-incident response process.

Module 7 : Security Architecture and Tool Sets
    1. Explain the relationship between frameworks, common policies, controls, and procedures.

    2. Use data to recommend remediation of security issues related to identity and access management.

    3. Review security architecture and make recommendations to implement compensating controls.

    4. Use application security best practices while participating in the Software Development Life Cycle (SDLC).

Module 8 : Security Monitoring and Access Control 
    1. Continuously monitor and analyze security events

    2. Vulnerabilities, and recommend security enhancements

    3. Security Policies and Procedures: Develop and enforce security policies, standards, and procedures to ensure a consistent and secure computing environment

    4. Access Control: Implement and manage access control systems, including user authentication, authorization, and password policies

Module 9 : Security Tools 
    1. Utilize a range of security tools such as Intrusion Detection Systems (IDS)

    2. Intrusion prevention systems (IPS), firewalls, antivirus software, and data encryption

“Hackanics provides industry-leading certifications, courses, and professional expertise to help you achieve the tech career you deserve.”

Links

  • About us
  • Services
  • Courses
  • Blog
  • Contact us

Contact Info

  • +91 9920955055
  • contact@hackanics.com
  • Mumbai , Pune , Bangalore, Udaipur , Jaipur

Sign up for Newsletter

X-twitter Linkedin Instagram Youtube Facebook

Hackanics copyright © 2024. All Rights Reserved.

Copyright © Whizcyber 2024. All rights reserved