Secure Your Future
with Cybersecurity Analyst Training

Join us on a transformative journey to become a proficient Cybersecurity Analyst. Our comprehensive hybrid online program, lasting around seven months, provides both theoretical knowledge and hands-on experience in Security Operations Center (SOC) training.

Cybersecurity Analyst
Program

Secure Your Future with Cybersecurity Analyst Training
Start Date: March 23rd, 2025

$13,500

Flexible and affordable payment options are available! Reach out to [email protected]

Hybrid Online

31 Weeks

Hands-on Projects  

~14 Hour per Week

Key Concepts

Comprehensive Cybersecurity Training: Our program is structured to provide a progressive learning experience, combining foundational knowledge with hands-on labs and real-world SOC training. From CompTIA Security+ certification preparation to advanced threat detection and incident response, students gain a well-rounded cybersecurity education.

Hands-On Learning with Industry-Standard Tools: Cybersecurity is a practical field, and our training reflects that. Students will engage in hands-on exercises, SOC simulations, and cyber range labs using industry-leading tools, including:

● Splunk: Real-time log analysis, threat hunting, and SIEM operations.
● IBM QRadar: Advanced Security Information and Event Management (SIEM) for detecting and analyzing security incidents.
● Falcon Crowdstrike EDR: Endpoint Detection & Response for monitoring and mitigating advanced threats.
● Wireshark: Network traffic analysis for detecting anomalies and investigating security breaches.
● Jira: Ticket management system used in SOCs to track security incidents.
● Nessus: Network vulnerability scanning to identify security weaknesses.
Kali Linux: Offensive security operating system used for penetration testing and ethical hacking.

CYDEO Security Operations Center (SOC) Experience: Our program includes real-world SOC training, where students investigate live attack data from honeypots and apply SIEM analysis, log correlation, and incident response techniques.

Cloud Security Fundamentals: Understand the essentials of cloud security, including identity and access management, data security, and cloud threat mitigation on AWS.

Certification Readiness: Our program prepares students to earn globally recognized certifications, including:
CompTIA Security+: Industry-standard cybersecurity certification.
AWS Certified Cloud Practitioner: Demonstrating cloud security expertise.

Who Will Benefit

Newcomers to Cybersecurity:
Anyone looking to enter the cybersecurity field, regardless of previous experience, will benefit from our foundational to advanced training, gaining practical knowledge and industry-recognized certifications.

A New Career Seeker in IT:
IT professionals transitioning into cybersecurity roles will gain the comprehensive knowledge and hands-on skills needed to excel as a Cybersecurity Analyst.

College Students:
Get a head start in the cybersecurity field with practical knowledge, hands-on experience, and industry-recognized certifications. Stay current with the latest technologies, tools, and practices to enhance your expertise and career prospects.

Corporate Training:
Equip your team with advanced cybersecurity skills and knowledge to protect your organization’s digital assets. Reach out to [email protected] for more information.

Prerequisites

● Beginner-Friendly: No prior knowledge or experience required. This course is perfect for anyone interested in starting a career in cybersecurity from scratch.

Prerequisites

Beginner-Friendly: No prior knowledge or experience required. This course is perfect for anyone interested in starting a career in cybersecurity from Scratch.

Syllabus

Module 1
CompTIA Security+ Exam Preparation
1-5
weeks

This module is designed to prepare you for the CompTIA Security+ certification exam. You will cover essential security concepts, network security, and threat management strategies required to excel in the exam and in enterprise environments. 

  • Social Engineering Threats and Techniques 
  • Security Concepts in Enterprise Environments 
  • Network Security, Log Management, Threat and Vulnerability Management 
  • Key Enterprise Security Implementation Topics
Module 2
Hands-On Labs with Range Force
6 - 30
weeks

This module is designed to build practical cybersecurity skills using Range Force, an industry-leading cloud-based cyber range. Through hands-on labs, you will work with real-world tools, investigate cyber threats, and develop core competencies in threat detection, network defense, incident response, penetration testing, and malware analysis.

The following topics will be covered through interactive, scenario-based labs:

Foundational Cybersecurity Skills 

  • Linux Foundations,
  • Networking Basics
  • Cybersecurity Frameworks
  • PowerShell Fundamentals

Security Operations & Threat Detection

  • Early Detection of Ransomware
  • Security Information and Event Management (SIEM)
  • Incident Response Fundamentals
  • SOC Operations

Threat Intelligence & Malware Analysis

  • Threat Intelligence Tools
  • Wireshark Essentials
  • Malware Analysis 

Offensive Security

  • Kali Linux & Pentesting Tools
  • Threat Modeling and Vulnerability Identification
  • Exploitation, Privilege Escalation & Lateral Movement

Capstone Projects

  • SOC Analyst Capstone: Simulated SOC operations, incident response, and SIEM analysis.
  • Penetration Tester Capstone: A complete end-to-end penetration test, including reconnaissance, exploitation, and post-engagement activities.
Module 3
CYDEO’s SOC – Real-World Security Operations
12 - 30
weeks

This module immerses students in real-world SOC workflows, enabling them to analyze live security logs, investigate incidents, and respond to cyber threats using industry-standard tools. Unlike traditional simulated environments, CYDEO’s SOC features live honeypots, meaning students work with real attack data collected from active cyber threats.

 By the end of this module, students will:

  • Operate within a realistic SOC environment
  • Gain hands-on experience with Splunk, IBM QRadar, Falcon CrowdStrike, Jira, Nessus and Wireshark
  • Learn SIEM analysis, log correlation, incident response, and threat hunting
  • Investigate real-world attacks, including phishing, malware infections, and network intrusions
Module 4
Career Readiness & Market Preparation
23 - 28
weeks

This module is designed to ensure you’re fully prepared for your cybersecurity career. Our goal is to equip you with the professional tools and strategies needed to stand out in the job market and confidently secure cybersecurity roles.

Key Topics Covered:

  • LinkedIn Profile Optimization
  • Resume Building.
  • Mock Interview Preparation

This module ensures that graduates are not only technically proficient but also market-ready, giving them a competitive edge in securing cybersecurity roles.

Module 5
AWS Cloud Practitioner
26 - 28
weeks

By the end of this module, students will:

  • Understand key AWS cloud concepts and security models
  • Learn cloud security fundamentals, including IAM, logging, and threat detection
  • Be fully prepared to pass the AWS Certified Cloud Practitioner exam

AWS Security Topics from Range Force:

In addition to Cloud Practitioner exam topics, this module will include hands-on AWS security labs using Range Force, covering:

  • AWS Logging & Monitoring
  • AWS Identity & Access Management (IAM)
  • AWS S3 Security Basics
  • AWS Forensics & Incident Response
Module 6
Python Essentials for Cybersecurity
29 - 31
weeks

Build a strong foundation in Python programming with AI-assisted learning, designed for cybersecurity professionals.

Key Topics Covered:

  • Master core Python programming concepts and fundamentals
  • Learn Object-Oriented Programming (OOP) for structured coding
  • Utilize AI tools to improve coding efficiency and problem-solving
  • Practice Python through hands-on exercises relevant to cybersecurity tasks

This module provides essential Python skills to enhance problem-solving and automation capabilities, preparing students for further cybersecurity learning.

Syllabus

Module 1
CompTIA Security+ Exam Preparation
1-5
weeks

This module is designed to prepare you for the CompTIA Security+ certification exam. You will cover essential security concepts, network security, and threat management strategies required to excel in the exam and in enterprise environments. 

  • Social Engineering Threats and Techniques 
  • Security Concepts in Enterprise Environments 
  • Network Security, Log Management, Threat and Vulnerability Management 
  • Key Enterprise Security Implementation Topics
Module 2
Hands-On Labs with Range Force
6 - 30
weeks

This module is designed to build practical cybersecurity skills using Range Force, an industry-leading cloud-based cyber range. Through hands-on labs, you will work with real-world tools, investigate cyber threats, and develop core competencies in threat detection, network defense, incident response, penetration testing, and malware analysis.

The following topics will be covered through interactive, scenario-based labs:

Foundational Cybersecurity Skills 

  • Linux Foundations,
  • Networking Basics
  • Cybersecurity Frameworks
  • PowerShell Fundamentals

Security Operations & Threat Detection

  • Early Detection of Ransomware
  • Security Information and Event Management (SIEM)
  • Incident Response Fundamentals
  • SOC Operations

Threat Intelligence & Malware Analysis

  • Threat Intelligence Tools
  • Wireshark Essentials
  • Malware Analysis 

Offensive Security

  • Kali Linux & Pentesting Tools
  • Threat Modeling and Vulnerability Identification
  • Exploitation, Privilege Escalation & Lateral Movement

Capstone Projects

  • SOC Analyst Capstone: Simulated SOC operations, incident response, and SIEM analysis.
  • Penetration Tester Capstone: A complete end-to-end penetration test, including reconnaissance, exploitation, and post-engagement activities.
Module 3
CYDEO’s SOC – Real-World Security Operations
12 - 30
weeks

This module immerses students in real-world SOC workflows, enabling them to analyze live security logs, investigate incidents, and respond to cyber threats using industry-standard tools. Unlike traditional simulated environments, CYDEO’s SOC features live honeypots, meaning students work with real attack data collected from active cyber threats.

 By the end of this module, students will:

  • Operate within a realistic SOC environment
  • Gain hands-on experience with Splunk, IBM QRadar, Falcon CrowdStrike, Jira, Nessus and Wireshark
  • Learn SIEM analysis, log correlation, incident response, and threat hunting
  • Investigate real-world attacks, including phishing, malware infections, and network intrusions
Module 4
Career Readiness & Market Preparation
23 - 28
weeks

This module is designed to ensure you’re fully prepared for your cybersecurity career. Our goal is to equip you with the professional tools and strategies needed to stand out in the job market and confidently secure cybersecurity roles.

Key Topics Covered:

  • LinkedIn Profile Optimization
  • Resume Building.
  • Mock Interview Preparation

This module ensures that graduates are not only technically proficient but also market-ready, giving them a competitive edge in securing cybersecurity roles.

Module 5
AWS Cloud Practitioner
26 - 28
weeks

By the end of this module, students will:

  • Understand key AWS cloud concepts and security models
  • Learn cloud security fundamentals, including IAM, logging, and threat detection
  • Be fully prepared to pass the AWS Certified Cloud Practitioner exam

AWS Security Topics from Range Force:

In addition to Cloud Practitioner exam topics, this module will include hands-on AWS security labs using Range Force, covering:

  • AWS Logging & Monitoring
  • AWS Identity & Access Management (IAM)
  • AWS S3 Security Basics
  • AWS Forensics & Incident Response
Module 6
Python Essentials for Cybersecurity
29 - 31
weeks

Build a strong foundation in Python programming with AI-assisted learning, designed for cybersecurity professionals.

Key Topics Covered:

  • Master core Python programming concepts and fundamentals
  • Learn Object-Oriented Programming (OOP) for structured coding
  • Utilize AI tools to improve coding efficiency and problem-solving
  • Practice Python through hands-on exercises relevant to cybersecurity tasks

This module provides essential Python skills to enhance problem-solving and automation capabilities, preparing students for further cybersecurity learning.

What You Earn

Comprehensive
Skill Set

Gain a comprehensive and robust skill set essential for a successful career as a Cybersecurity Analyst. This program covers foundational knowledge in cybersecurity, advanced technical skills in malware analysis, incident response, and threat intelligence, and provides extensive hands-on experience with industry-leading tools like Splunk, IBM QRadar, Crowdstrike, Wireshark and Jira. You will also prepare for key certifications like Security+ and gain cloud security proficiency with AWS Cloud Practitioner training.
By the end of this program, you will be a well-rounded Cybersecurity Analyst, ready to protect and defend against modern cyber threats and add value to any security team.

Career
Advancement:

Gain the confidence and security that comes with being a highly skilled professional in the tech industry. Our course provides you with the essential tools and expertise needed to thrive in your career, ensuring long-term job stability. Equip yourself with skills that employers are actively seeking and secure your future in the ever-evolving tech landscape.

Certification of Achievement

Earn a prestigious certificate upon completion of our program, showcasing your expertise and commitment to excellence. This certification will serve as a testament to your skills and knowledge, giving you a competitive edge in the job market. Proudly display your achievement and use it to propel your career to new heights.

Please register to join our
Cybersecurity Analyst Program Live Webinar on February 21st, at 11:00 AM EST.

Cybersecurity Analyst Intro Session





By providing your number, you agree to opt-in for our text message services.

FAQ’s for Cybersecurity Analyst Program

The Cybersecurity Analyst program is designed to provide comprehensive training in cybersecurity fundamentals and advanced practices. The program covers a broad range of topics, including cybersecurity basics, networking essentials, incident response, malware analysis, and advanced SOC operations. Students will gain hands-on experience using industry-standard tools such as Range Force, IBM QRadar, Splunk, and Nessus. Additionally, the program prepares participants for key cybersecurity certifications, such as CompTIA Security+ and AWS Cloud Practitioner. This comprehensive approach equips students with the skills needed to identify, protect, detect, respond to, and recover from cybersecurity threats, making them well-prepared for real-world cybersecurity roles.

This course is beginner-friendly with no prior knowledge or experience required. It is perfect for anyone interested in starting a career in cybersecurity from scratch.

The course spans 31 weeks, with weekly modules covering various aspects of cybersecurity, from fundamentals to advanced topics, including hands-on experience  with industry tools, SOC training  and preparation for key certifications like Security+.

Hands-on experience is essential for developing practical skills and applying theoretical knowledge to real-world scenarios. It prepares you to effectively use cybersecurity tools and techniques, making you job-ready and capable of handling complex security challenges.

The Security+ exam preparation module covers all the key topics included in the certification exam, such as risk management, incident response, and cryptography. You’ll engage in detailed study sessions and practice exams to ensure you’re fully prepared.

Graduates of the Cybersecurity Analyst program can pursue roles such as Cybersecurity Analyst, SOC Analyst, Incident Responder, Threat Intelligence Analyst, and more. The skills and certifications gained through this program will make you a competitive candidate in the cybersecurity job market.

These modules focus on practical exercises and real-world scenarios to build proficiency in SOC tools and techniques, including Splunk, IBM QRadar, Falcon Crowdstrike EDR, and Wireshark.

In the Cydeo Security Operation Center, students will gain hands-on experience with real-world threats and learn to use the appropriate defensive tools to identify, protect, detect, respond, and recover from these threats. Key learning outcomes include:

  • Investigating Alarms, Events, and Incidents: Students will learn to investigate alarms, events, and incidents or any malicious activity and respond to the situation by creating a ticket or escalating the issue.
  • Using SIEM Tools: Proficiency in using Splunk and IBM QRadar for searching and investigating incidents using queries.
  • Endpoint Security: Execution of detection and prevention measures using CrowdStrike.
  • Ticket Management: Utilizing Jira as the main tool for managing cybersecurity events and log management.
  • Understanding Indicators of Compromise: Recognizing signs of potential threats and malicious activities.
  • Highlighting Attackers’ TTPs and Threat Landscape: Identifying tactics, techniques, and procedures used by attackers and understanding the broader threat landscape.
  • Vulnerability Analysis: Using Nessus for network vulnerability scanning and Elastic Security for preventing, detecting, and responding to threats.
  • Operational Procedures: Participating in daily handover, stand-up, and sit-down briefings implemented in shifts, and using investigation tools for malicious activities, vulnerability analysis, and network traffic analysis

EDR (Endpoint Detection and Response) tools are crucial for identifying, investigating, and mitigating security threats at the endpoint level, providing visibility into potential threats and enabling rapid response. Falcon Crowdstrike, in particular, is a leading EDR tool known for its advanced threat detection capabilities, real-time incident investigation, and robust endpoint protection. It helps SOC analysts detect suspicious behaviors and network activities, enhancing the overall security posture of an organization. Training on Falcon Crowdstrike focuses on incident investigation, detection analysis, and identifying suspicious behaviors, solidifying your proficiency with this essential SOC tool.

In the Cydeo Security Operation Center, students will use a variety of tools to gain hands-on experience and effectively manage cybersecurity threats. These tools include:

  • Splunk and IBM QRadar: SIEM tools used for searching and investigating incidents using queries.
  • CrowdStrike: A leading endpoint security tool for detection and prevention.
  • Jira: The primary tool for managing cybersecurity events, tickets, and log management.
  • Nessus: A network vulnerability scanner used for vulnerability analysis.

Packet capturing tools are essential for monitoring network traffic, analyzing data packets, and troubleshooting network issues. Wireshark is a powerful packet capture tool used to identify security anomalies, investigate network problems, and perform deep packet inspection. In the Wireshark classes, you will learn to operate Wireshark for packet capture, analysis, and troubleshooting. Through practical exercises, you’ll develop skills in interpreting packet data, detecting network-based threats, and conducting comprehensive network analysis. These classes ensure you can effectively utilize Wireshark to enhance network security and investigative capabilities within a SOC environment.

Soft skill sessions focus on professional and personal development, including experience sharing, communication, and problem-solving skills. They enhance your ability to work effectively in IT environments. 

Active participation and consistent practice are crucial for maximizing your learning experience and skill development.

You can reach out through the class communication channels, such as chat and email, for support and questions.

Yes, the course includes hands-on practices and tasks during the class hours to reinforce learning and practical skills.

Registration details can be found on the course website or by contacting the enrollment team at [email protected].

The Cybersecurity Analyst program is designed to provide comprehensive training in cybersecurity fundamentals and advanced practices. The program covers a broad range of topics, including cybersecurity basics, networking essentials, incident response, malware analysis, and advanced SOC operations. Students will gain hands-on experience using industry-standard tools such as Range Force, IBM QRadar, Splunk, and Nessus. Additionally, the program prepares participants for key cybersecurity certifications, such as CompTIA Security+ and AWS Cloud Practitioner. This comprehensive approach equips students with the skills needed to identify, protect, detect, respond to, and recover from cybersecurity threats, making them well-prepared for real-world cybersecurity roles.

This course is beginner-friendly with no prior knowledge or experience required. It is perfect for anyone interested in starting a career in cybersecurity from scratch.

The course spans 31 weeks, with weekly modules covering various aspects of cybersecurity, from fundamentals to advanced topics, including hands-on experience  with industry tools, SOC training  and preparation for key certifications like Security+.

Hands-on experience is essential for developing practical skills and applying theoretical knowledge to real-world scenarios. It prepares you to effectively use cybersecurity tools and techniques, making you job-ready and capable of handling complex security challenges.

The Security+ exam preparation module covers all the key topics included in the certification exam, such as risk management, incident response, and cryptography. You’ll engage in detailed study sessions and practice exams to ensure you’re fully prepared.

Graduates of the Cybersecurity Analyst program can pursue roles such as Cybersecurity Analyst, SOC Analyst, Incident Responder, Threat Intelligence Analyst, and more. The skills and certifications gained through this program will make you a competitive candidate in the cybersecurity job market.

These modules focus on practical exercises and real-world scenarios to build proficiency in SOC tools and techniques, including Splunk, IBM QRadar, Falcon Crowdstrike EDR, and Wireshark.

In the Cydeo Security Operation Center, students will gain hands-on experience with real-world threats and learn to use the appropriate defensive tools to identify, protect, detect, respond, and recover from these threats. Key learning outcomes include:

  • Investigating Alarms, Events, and Incidents: Students will learn to investigate alarms, events, and incidents or any malicious activity and respond to the situation by creating a ticket or escalating the issue.
  • Using SIEM Tools: Proficiency in using Splunk and IBM QRadar for searching and investigating incidents using queries.
  • Endpoint Security: Execution of detection and prevention measures using CrowdStrike.
  • Ticket Management: Utilizing Jira as the main tool for managing cybersecurity events and log management.
  • Understanding Indicators of Compromise: Recognizing signs of potential threats and malicious activities.
  • Highlighting Attackers’ TTPs and Threat Landscape: Identifying tactics, techniques, and procedures used by attackers and understanding the broader threat landscape.
  • Vulnerability Analysis: Using Nessus for network vulnerability scanning and Elastic Security for preventing, detecting, and responding to threats.
  • Operational Procedures: Participating in daily handover, stand-up, and sit-down briefings implemented in shifts, and using investigation tools for malicious activities, vulnerability analysis, and network traffic analysis

EDR (Endpoint Detection and Response) tools are crucial for identifying, investigating, and mitigating security threats at the endpoint level, providing visibility into potential threats and enabling rapid response. Falcon Crowdstrike, in particular, is a leading EDR tool known for its advanced threat detection capabilities, real-time incident investigation, and robust endpoint protection. It helps SOC analysts detect suspicious behaviors and network activities, enhancing the overall security posture of an organization. Training on Falcon Crowdstrike focuses on incident investigation, detection analysis, and identifying suspicious behaviors, solidifying your proficiency with this essential SOC tool.

In the Cydeo Security Operation Center, students will use a variety of tools to gain hands-on experience and effectively manage cybersecurity threats. These tools include:

  • Splunk and IBM QRadar: SIEM tools used for searching and investigating incidents using queries.
  • CrowdStrike: A leading endpoint security tool for detection and prevention.
  • Jira: The primary tool for managing cybersecurity events, tickets, and log management.
  • Nessus: A network vulnerability scanner used for vulnerability analysis.

Packet capturing tools are essential for monitoring network traffic, analyzing data packets, and troubleshooting network issues. Wireshark is a powerful packet capture tool used to identify security anomalies, investigate network problems, and perform deep packet inspection. In the Wireshark classes, you will learn to operate Wireshark for packet capture, analysis, and troubleshooting. Through practical exercises, you’ll develop skills in interpreting packet data, detecting network-based threats, and conducting comprehensive network analysis. These classes ensure you can effectively utilize Wireshark to enhance network security and investigative capabilities within a SOC environment.

Soft skill sessions focus on professional and personal development, including experience sharing, communication, and problem-solving skills. They enhance your ability to work effectively in IT environments. 

Active participation and consistent practice are crucial for maximizing your learning experience and skill development.

You can reach out through the class communication channels, such as chat and email, for support and questions.

Yes, the course includes hands-on practices and tasks during the class hours to reinforce learning and practical skills.

Registration details can be found on the course website or by contacting the enrollment team at [email protected].

Testimonial

CHRYSTLE

Balancing motherhood and studies, she overcame challenges, relying on her dedication, practice, and the support of her peers with the guidance of CYDEO’s comprehensive program.

HUSNA

Despite having no previous IT experience, Husna committed to learning Java and found her passion for coding and problem-solving. Her hard work paid off, as she transitioned to the IT industry.

TARIQ

Learn how Tariq transitioned from a personal trainer to a professional automation tester within 7 months. Tariq shares why he needed a career change & how CYDEO helped launch a new tech career from scratch.

BRADLEY

I had heard about CYDEO while I was still in the military. My friends had gone through CYDEO, successfully completed the curriculum, and had been hired relatively quickly.