CYBER-

SECURITY

ANALYST

Secure Your Future
with Cybersecurity
Analyst Training

Join us on a transformative journey to become a proficient cybersecurity analyst. Our comprehensive hybrid online program, lasting around seven months, provides both theoretical knowledge and hands-on experience in Security Operations Center (SOC) training.

Secure Your Future
with Cybersecurity
Analyst Training

Join us on a transformative journey to become a proficient cybersecurity analyst. Our comprehensive hybrid online program, lasting around seven months, provides both theoretical knowledge and hands-on experience in Security Operations Center (SOC) training.

Cybersecurity Analyst Program

Secure Your Future with Cybersecurity Analyst Training

Start Date: Nov 23rd, 2024

$13,500*

Hybrid Online Course

31 Weeks

Hands-on SOC Training

~14 Hour per Week

* Flexible and affordable payment options are available! Reach out to [email protected]

Key Concepts

Comprehensive Cybersecurity Training: Dive deep into the core components of cybersecurity. Our program covers everything from foundational principles to advanced threat analysis, ensuring you’re prepared for real-world challenges.

Hands-On Practice with Real World Tools: We believe in learning by practicing. Our training includes extensive hands-on labs and practical exercises, including Range Force which allows you to apply what you’ve learned in simulated environments and gain practical experience.

State-of-the-Art Tools:Our program ensures you gain hands-on experience with industry-standard tools that are pivotal for cybersecurity operations. Learn to utilize:

● Splunk: Gain proficiency in log analysis and monitoring for real-time security insights and threat detection.
● IBM QRadar: Master comprehensive security information and event management (SIEM) for effective threat detection and response.
● Falcon Crowdstrike EDR: Gain expertise in endpoint detection and response to safeguard against sophisticated attacks.
● Wireshark: Develop skills in packet capture and network analysis for deep network visibility and troubleshooting.
● Jira: Learn to manage cybersecurity events, tickets, and log management efficiently.
● Nessus: Master network vulnerability scanning to identify and address security weaknesses.

Certification Readiness: Upon completion, be prepared to pursue industry-recognized certifications like CompTIA Security+ and AWS Certified Cloud Practitioner Certification , validating your skills and knowledge in the cybersecurity domain.

Comprehensive SOC Experience: Work on real-world threats and scenarios in our Security Operations Center training, gaining the practical experience needed to excel as a Level 1 or Tier 1 security analyst.

 Cloud Security Fundamentals: Understand the essentials of cloud security, including identity and access management, data security, and cloud threat mitigation for both Azure and AWS platforms.

Who Will Benefit

Newcomers to Cybersecurity:
Anyone looking to enter the cybersecurity field, regardless of previous experience, will benefit from our foundational to advanced training, gaining practical knowledge and industry-recognized certifications.

A New Career Seeker in IT:
IT professionals transitioning into cybersecurity roles will gain the comprehensive knowledge and hands-on skills needed to excel as a cybersecurity analyst

College Students:
Get a head start in the cybersecurity field with practical knowledge, hands-on experience, and industry-recognized certifications. Stay current with the latest technologies, tools, and practices to enhance your expertise and career prospects.

Corporate Training:
Equip your team with advanced cybersecurity skills and knowledge to protect your organization’s digital assets. Reach out to [email protected] for more information.

Newcomers to Cybersecurity:
Anyone looking to enter the cybersecurity field, regardless of previous experience, will benefit from our foundational to advanced training, gaining practical knowledge and industry-recognized certifications.

A New Career
Seeker in IT:

IT professionals transitioning into cybersecurity roles will gain the comprehensive knowledge and hands-on skills needed to excel as a cybersecurity analyst

College Students:
Get a head start in the cybersecurity field with practical knowledge, hands-on experience, and industry-recognized certifications. Stay current with the latest technologies, tools, and practices to enhance your expertise and career prospects.

Corporate Training:
Equip your team with advanced cybersecurity skills and knowledge to protect your organization’s digital assets. Reach out to [email protected] for more information.

Prerequisites

● Beginner-Friendly: No prior knowledge or experience required. This course is perfect for anyone interested in starting a career in cybersecurity from scratch.

Prerequisites

● Beginner-Friendly: No prior knowledge or experience required. This course is perfect for anyone interested in starting a career in cybersecurity from scratch.

Syllabus

Module 1
Introduction to Cybersecurity, Computer Fundamentals and Networking Fundamentals
3
Weeks

In this module, you will be introduced to the foundational concepts of cybersecurity and networking. You’ll gain a strong understanding of basic computer and network essentials, setting the stage for more advanced topics in later modules.

  • Basics of cybersecurity, terminology and fundamentals
  • Computer and network essentials
  • Introduction to networking, OSI model, basic network concepts
Module 2
RANGE FORCE Introduction and Basic Topics
3
Weeks

This module leverages Range Force, a cutting-edge, industry-standard hands-on tool, to focus on practical skills and fundamental knowledge required for cybersecurity operations. You will learn the basics of cybersecurity, computer and network essentials, and introductory security operations, preparing you for real-world incident handling and response.

  • Linux command line, file management, permissions
  • Detailed networking concepts (routing, NAT, PCAP forensics)
  • Introduction to security operations (SOC, incident handling)
  • Investigating and Responding to Cybersecurity Incidents
  • Security fundamentals, threat landscape, SIEM, SOAR
  • Malware, endpoint security, security operations
Module 3
CompTIA Security+ Exam Preparation
5
Weeks

This module is designed to prepare you for the CompTIA Security+ certification exam. You will cover essential security concepts, network security, and threat management strategies required to excel in the exam and in enterprise environments.

  • Security concepts in enterprise environments
  • Network security, log management, threat and vulnerability management
Module 4
SOC Training and Range Force Advanced Topics in Cybersecurity, Hands-On Tools, SOC Analyst Skills
10
Weeks

In this extensive module, you will again utilize Range Force to engage in advanced cybersecurity topics and hands-on training with SOC tools. You’ll develop skills in malware analysis, threat intelligence, and offensive security, preparing you for advanced SOC analyst roles.

  • Ransomware, phishing, attacker TTPs, MITRE ATT&CK framework
  • Elastic Stack, Splunk, IBM QRadar, PowerShell fundamentals
  • Scripting (Shell, PowerShell), log management, malware analysis
  • Intrusion detection, vulnerability management, threat intelligence
  • Offensive security assessments, reconnaissance, exploitation techniques
  • Threat modeling, vulnerability identification, exploitation tools
Module 5
AWS Cloud Practitioner
3
Weeks

This final module provides you with a comprehensive understanding of cloud computing principles and AWS services. The training will prepare you for the AWS Cloud Practitioner certification, emphasizing cloud security and best practices.

  • Cloud computing principles
  • AWS services and security
  • Preparation for AWS Cloud Practitioner certification

Syllabus

Module 1
Introduction to Cybersecurity, Computer Fundamentals and Networking Fundamentals
3
hrs

In this module, you will be introduced to the foundational concepts of cybersecurity and networking. You’ll gain a strong understanding of basic computer and network essentials, setting the stage for more advanced topics in later modules.

  • Basics of cybersecurity, terminology and fundamentals
  • Computer and network essentials
  • Introduction to networking, OSI model, basic network concepts
Module 2
RANGE FORCE Introduction and Basic Topics
3
hrs

This module leverages Range Force, a cutting-edge, industry-standard hands-on tool, to focus on practical skills and fundamental knowledge required for cybersecurity operations. You will learn the basics of cybersecurity, computer and network essentials, and introductory security operations, preparing you for real-world incident handling and response.

  • Linux command line, file management, permissions
  • Detailed networking concepts (routing, NAT, PCAP forensics)
  • Introduction to security operations (SOC, incident handling)
  • Investigating and Responding to Cybersecurity Incidents
  • Security fundamentals, threat landscape, SIEM, SOAR
  • Malware, endpoint security, security operations
Module 3
CompTIA Security+ Exam Preparation
5
hrs

This module is designed to prepare you for the CompTIA Security+ certification exam. You will cover essential security concepts, network security, and threat management strategies required to excel in the exam and in enterprise environments.

  • Security concepts in enterprise environments
  • Network security, log management, threat and vulnerability management
Module 4
SOC Training and Range Force Advanced Topics in Cybersecurity, Hands-On Tools, SOC Analyst Skills
10
hrs

In this extensive module, you will again utilize Range Force to engage in advanced cybersecurity topics and hands-on training with SOC tools. You’ll develop skills in malware analysis, threat intelligence, and offensive security, preparing you for advanced SOC analyst roles.

  • Ransomware, phishing, attacker TTPs, MITRE ATT&CK framework
  • Elastic Stack, Splunk, IBM QRadar, PowerShell fundamentals
  • Scripting (Shell, PowerShell), log management, malware analysis
  • Intrusion detection, vulnerability management, threat intelligence
  • Offensive security assessments, reconnaissance, exploitation techniques
  • Threat modeling, vulnerability identification, exploitation tools
Module 5
AWS Cloud Practitioner
3
hrs

This final module provides you with a comprehensive understanding of cloud computing principles and AWS services. The training will prepare you for the AWS Cloud Practitioner certification, emphasizing cloud security and best practices.

  • Cloud computing principles
  • AWS services and security
  • Preparation for AWS Cloud Practitioner certification

What You Earn

Comprehensive
Skill Set

Gain a comprehensive and robust skill set essential for a successful career as a Cybersecurity Analyst. This program covers foundational knowledge in cybersecurity, advanced technical skills in malware analysis, incident response, and threat intelligence, and provides extensive hands-on experience with industry-leading tools like Splunk, IBM QRadar, Crowdstrike, Wireshark and Jira. You will also prepare for key certifications like Security+ and gain cloud security proficiency with AWS Cloud Practitioner training.
By the end of this program, you will be a well-rounded Cybersecurity Analyst, ready to protect and defend against modern cyber threats and add value to any security team.

Career
Advancement:

Gain the confidence and security that comes with being a highly skilled professional in the tech industry. Our course provides you with the essential tools and expertise needed to thrive in your career, ensuring long-term job stability. Equip yourself with skills that employers are actively seeking and secure your future in the ever-evolving tech landscape.

Certification of Achievement

Earn a prestigious certificate upon completion of our program, showcasing your expertise and commitment to excellence. This certification will serve as a testament to your skills and knowledge, giving you a competitive edge in the job market. Proudly display your achievement and use it to propel your career to new heights.

Please register here to join our
Cybersecurity Analyst Program Live Webinar
on October 12th, at 1:00 PM EST.

Cybersecurity Analyst Intro Session





By providing your number, you agree to opt-in for our text message services.


FAQ’a for Cybersecurity Analyst Program

The Cybersecurity Analyst program is designed to provide comprehensive training in cybersecurity fundamentals and advanced practices. The program covers a broad range of topics, including cybersecurity basics, networking essentials, incident response, malware analysis, and advanced SOC operations. Students will gain hands-on experience using industry-standard tools such as Range Force, IBM QRadar, Splunk, and Nessus. Additionally, the program prepares participants for key cybersecurity certifications, such as CompTIA Security+ and AWS Cloud Practitioner. This comprehensive approach equips students with the skills needed to identify, protect, detect, respond to, and recover from cybersecurity threats, making them well-prepared for real-world cybersecurity roles.

This course is beginner-friendly with no prior knowledge or experience required. It is perfect for anyone interested in starting a career in cybersecurity from scratch.

The course spans 31 weeks, with weekly modules covering various aspects of cybersecurity, from fundamentals to advanced topics, including hands-on experience  with industry tools, SOC training  and preparation for key certifications like Security+.

Hands-on experience is essential for developing practical skills and applying theoretical knowledge to real-world scenarios. It prepares you to effectively use cybersecurity tools and techniques, making you job-ready and capable of handling complex security challenges.

The Security+ exam preparation module covers all the key topics included in the certification exam, such as risk management, incident response, and cryptography. You’ll engage in detailed study sessions and practice exams to ensure you’re fully prepared.

Graduates of the Cybersecurity Analyst program can pursue roles such as Cybersecurity Analyst, SOC Analyst, Incident Responder, Threat Intelligence Analyst, and more. The skills and certifications gained through this program will make you a competitive candidate in the cybersecurity job market.

These modules focus on practical exercises and real-world scenarios to build proficiency in SOC tools and techniques, including Splunk, IBM QRadar, Falcon Crowdstrike EDR, and Wireshark.

In the Cydeo Security Operation Center, students will gain hands-on experience with real-world threats and learn to use the appropriate defensive tools to identify, protect, detect, respond, and recover from these threats. Key learning outcomes include:

  • Investigating Alarms, Events, and Incidents: Students will learn to investigate alarms, events, and incidents or any malicious activity and respond to the situation by creating a ticket or escalating the issue.
  • Using SIEM Tools: Proficiency in using Splunk and IBM QRadar for searching and investigating incidents using queries.
  • Endpoint Security: Execution of detection and prevention measures using CrowdStrike.
  • Ticket Management: Utilizing Jira as the main tool for managing cybersecurity events and log management.
  • Understanding Indicators of Compromise: Recognizing signs of potential threats and malicious activities.
  • Highlighting Attackers’ TTPs and Threat Landscape: Identifying tactics, techniques, and procedures used by attackers and understanding the broader threat landscape.
  • Vulnerability Analysis: Using Nessus for network vulnerability scanning and Elastic Security for preventing, detecting, and responding to threats.
  • Operational Procedures: Participating in daily handover, stand-up, and sit-down briefings implemented in shifts, and using investigation tools for malicious activities, vulnerability analysis, and network traffic analysis

EDR (Endpoint Detection and Response) tools are crucial for identifying, investigating, and mitigating security threats at the endpoint level, providing visibility into potential threats and enabling rapid response. Falcon Crowdstrike, in particular, is a leading EDR tool known for its advanced threat detection capabilities, real-time incident investigation, and robust endpoint protection. It helps SOC analysts detect suspicious behaviors and network activities, enhancing the overall security posture of an organization. Training on Falcon Crowdstrike focuses on incident investigation, detection analysis, and identifying suspicious behaviors, solidifying your proficiency with this essential SOC tool.

In the Cydeo Security Operation Center, students will use a variety of tools to gain hands-on experience and effectively manage cybersecurity threats. These tools include:

  • Splunk and IBM QRadar: SIEM tools used for searching and investigating incidents using queries.
  • CrowdStrike: A leading endpoint security tool for detection and prevention.
  • Jira: The primary tool for managing cybersecurity events, tickets, and log management.
  • Nessus: A network vulnerability scanner used for vulnerability analysis.

Packet capturing tools are essential for monitoring network traffic, analyzing data packets, and troubleshooting network issues. Wireshark is a powerful packet capture tool used to identify security anomalies, investigate network problems, and perform deep packet inspection. In the Wireshark classes, you will learn to operate Wireshark for packet capture, analysis, and troubleshooting. Through practical exercises, you’ll develop skills in interpreting packet data, detecting network-based threats, and conducting comprehensive network analysis. These classes ensure you can effectively utilize Wireshark to enhance network security and investigative capabilities within a SOC environment.

Soft skill sessions focus on professional and personal development, including experience sharing, communication, and problem-solving skills. They enhance your ability to work effectively in IT environments. 

Active participation and consistent practice are crucial for maximizing your learning experience and skill development.

You can reach out through the class communication channels, such as chat and email, for support and questions.

Yes, the course includes hands-on practices and tasks during the class hours to reinforce learning and practical skills.

Registration details can be found on the course website or by contacting the enrollment team at [email protected].

The Cybersecurity Analyst program is designed to provide comprehensive training in cybersecurity fundamentals and advanced practices. The program covers a broad range of topics, including cybersecurity basics, networking essentials, incident response, malware analysis, and advanced SOC operations. Students will gain hands-on experience using industry-standard tools such as Range Force, IBM QRadar, Splunk, and Nessus. Additionally, the program prepares participants for key cybersecurity certifications, such as CompTIA Security+ and AWS Cloud Practitioner. This comprehensive approach equips students with the skills needed to identify, protect, detect, respond to, and recover from cybersecurity threats, making them well-prepared for real-world cybersecurity roles.

This course is beginner-friendly with no prior knowledge or experience required. It is perfect for anyone interested in starting a career in cybersecurity from scratch.

The course spans 31 weeks, with weekly modules covering various aspects of cybersecurity, from fundamentals to advanced topics, including hands-on experience  with industry tools, SOC training  and preparation for key certifications like Security+.

Hands-on experience is essential for developing practical skills and applying theoretical knowledge to real-world scenarios. It prepares you to effectively use cybersecurity tools and techniques, making you job-ready and capable of handling complex security challenges.

The Security+ exam preparation module covers all the key topics included in the certification exam, such as risk management, incident response, and cryptography. You’ll engage in detailed study sessions and practice exams to ensure you’re fully prepared.

Graduates of the Cybersecurity Analyst program can pursue roles such as Cybersecurity Analyst, SOC Analyst, Incident Responder, Threat Intelligence Analyst, and more. The skills and certifications gained through this program will make you a competitive candidate in the cybersecurity job market.

These modules focus on practical exercises and real-world scenarios to build proficiency in SOC tools and techniques, including Splunk, IBM QRadar, Falcon Crowdstrike EDR, and Wireshark.

In the Cydeo Security Operation Center, students will gain hands-on experience with real-world threats and learn to use the appropriate defensive tools to identify, protect, detect, respond, and recover from these threats. Key learning outcomes include:

  • Investigating Alarms, Events, and Incidents: Students will learn to investigate alarms, events, and incidents or any malicious activity and respond to the situation by creating a ticket or escalating the issue.
  • Using SIEM Tools: Proficiency in using Splunk and IBM QRadar for searching and investigating incidents using queries.
  • Endpoint Security: Execution of detection and prevention measures using CrowdStrike.
  • Ticket Management: Utilizing Jira as the main tool for managing cybersecurity events and log management.
  • Understanding Indicators of Compromise: Recognizing signs of potential threats and malicious activities.
  • Highlighting Attackers’ TTPs and Threat Landscape: Identifying tactics, techniques, and procedures used by attackers and understanding the broader threat landscape.
  • Vulnerability Analysis: Using Nessus for network vulnerability scanning and Elastic Security for preventing, detecting, and responding to threats.
  • Operational Procedures: Participating in daily handover, stand-up, and sit-down briefings implemented in shifts, and using investigation tools for malicious activities, vulnerability analysis, and network traffic analysis

EDR (Endpoint Detection and Response) tools are crucial for identifying, investigating, and mitigating security threats at the endpoint level, providing visibility into potential threats and enabling rapid response. Falcon Crowdstrike, in particular, is a leading EDR tool known for its advanced threat detection capabilities, real-time incident investigation, and robust endpoint protection. It helps SOC analysts detect suspicious behaviors and network activities, enhancing the overall security posture of an organization. Training on Falcon Crowdstrike focuses on incident investigation, detection analysis, and identifying suspicious behaviors, solidifying your proficiency with this essential SOC tool.

In the Cydeo Security Operation Center, students will use a variety of tools to gain hands-on experience and effectively manage cybersecurity threats. These tools include:

  • Splunk and IBM QRadar: SIEM tools used for searching and investigating incidents using queries.
  • CrowdStrike: A leading endpoint security tool for detection and prevention.
  • Jira: The primary tool for managing cybersecurity events, tickets, and log management.
  • Nessus: A network vulnerability scanner used for vulnerability analysis.

Packet capturing tools are essential for monitoring network traffic, analyzing data packets, and troubleshooting network issues. Wireshark is a powerful packet capture tool used to identify security anomalies, investigate network problems, and perform deep packet inspection. In the Wireshark classes, you will learn to operate Wireshark for packet capture, analysis, and troubleshooting. Through practical exercises, you’ll develop skills in interpreting packet data, detecting network-based threats, and conducting comprehensive network analysis. These classes ensure you can effectively utilize Wireshark to enhance network security and investigative capabilities within a SOC environment.

Soft skill sessions focus on professional and personal development, including experience sharing, communication, and problem-solving skills. They enhance your ability to work effectively in IT environments. 

Active participation and consistent practice are crucial for maximizing your learning experience and skill development.

You can reach out through the class communication channels, such as chat and email, for support and questions.

Yes, the course includes hands-on practices and tasks during the class hours to reinforce learning and practical skills.

Registration details can be found on the course website or by contacting the enrollment team at [email protected].

Testimonial

CHRSYTLE

Balancing motherhood and studies, she overcame challenges, relying on her dedication, practice, and the support of her peers with the guidance of CYDEO’s comprehensive program.

HUSNA

Despite having no previous IT experience, Husna committed to learning Java and found her passion for coding and problem-solving. Her hard work paid off, as she transitioned to the IT industry.

TARIQ

Learn how Tariq transitioned from a personal trainer to a professional automation tester within 7 months. Tariq shares why he needed a career change & how CYDEO helped launch a new tech career from scratch.

BRADLEY

I had heard about CYDEO while I was still in the military. My friends had gone through CYDEO, successfully completed the curriculum, and had been hired relatively quickly.