Top Banner
CYBER SECURITY ANALYSIS CERTIFICATE In an advanced field like cyber security, it’s crucial to stay ahead of the ever-changing landscape of new technologies—and the new threats that come along with them. That’s why our practical, competency-based program moves you quickly away from classroom theory and into hands-on training where you’ll work to learn rather than learn to work. The program culminates in an intensive, eight-hour simulation that mirrors a day in the life of a working security analyst, and tests everything you’ve learned, including your ability to work in a team with the other students in your cohort. You’ll come out the other side ready to take on any challenge and anticipate the next one. Hackers don’t learn from books—neither should you California State University, Fullerton | Certificate Program Professional Development Our online, sequential cohort model lets you plan ahead for your certificate program and complete it over one academic year, about 33 weeks, depending on the time between courses and holidays. Introduction to Security Tools and Technologies Triage, Response, Analysis and Remediation Security Operations Center Simulation 1. 2. 3. 4. When you invest in us, you can do it knowing we’ve invested in you as well, with instructors who are leaders in their fields and state-of-the-art technology that will help you make a successful transition from the classroom to the next step of your career. This is an approximate cost of completing the certificate program at 2017–2018 tuition rates. Tuition is subject to change at any time. Courses: 4 Time Commitment: 8–10 Courses Months Approximate Cost: $4,000 Ready to take the next step? Questions? You can learn more and register for the program at extension.fullerton.edu/cyber-security If you have any questions, please email us at [email protected] or call (657) 278-2611.
2

CYBER SECURITY ANALYSIS CERTIFICATE · This class will introduce you to security with a focus on Next-Generation Security Operations and is the first in the series of classes for

Jul 16, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CYBER SECURITY ANALYSIS CERTIFICATE · This class will introduce you to security with a focus on Next-Generation Security Operations and is the first in the series of classes for

CYBER SECURITY ANALYSIS CERTIFICATE

In an advanced field like cyber security, it’s crucial to stay ahead of the ever-changing landscape of new technologies—and the new threats that come along with them. That’s why our practical, competency-based program moves you quickly away from classroom theory and into hands-on training where you’ll work to learn rather than learn to work.

The program culminates in an intensive, eight-hour simulation that mirrors a day in the life of a working security analyst, and tests everything you’ve learned, including your ability to work in a team with the other students in your cohort. You’ll come out the other side ready to take on any challenge and anticipate the next one.

Hackers don’t learn from books—neither should you

California State University, Fullerton | Certificate Program

Professional Development

Our online, sequential cohort model lets you plan ahead for your certificate program and complete it over one academic year, about 33 weeks, depending on the time between courses and holidays.

Introduction to SecurityTools and TechnologiesTriage, Response, Analysis and RemediationSecurity Operations Center Simulation

1.2.3.4.

When you invest in us, you can do it knowing we’ve invested in you as well, with instructors who are leaders in their fields and state-of-the-art technology that will help you make a successful transition from the classroom to the next step of your career.

This is an approximate cost of completing the certificate program at 2017–2018 tuition rates. Tuition is subject to change at any time.

Courses:

4Time Commitment:

8–10

Courses

Months

Approximate Cost:

$4,000

Ready to take the next step?Questions?

You can learn more and register for the program at extension.fullerton.edu/cyber-security

If you have any questions, please email us at [email protected] or call (657) 278-2611.

Page 2: CYBER SECURITY ANALYSIS CERTIFICATE · This class will introduce you to security with a focus on Next-Generation Security Operations and is the first in the series of classes for

Come to us with some basic IT knowledge, and our practical, hands-on curriculum will focus and mold that knowledge into invaluable security expertise. Our cohort model means you’ll take your classes in the ideal order, progressing from security fundamentals all the way through an intensive real-world simulation of life on the job.

This class will introduce you to security with a focus on Next-Generation Security Operations and is the first in the series of classes for the Security Analyst I Certificate. What you get: A base understanding of Next-Generation Security Operations Centers as well as the Deter, Detect, Respond, Remediate (DDRR) operating model. Finally, you will gain fundamental knowledge in the area of network-related technologies and protocols.

CYBER SECURITY ANALYSIS CERTIFICATECertificate Program | Course Summaries

Introduction to Security

In this class, you will be introduced to the core tools and technologies used by professionals to analyze cyber-attacks at a low level. There will be a heavy focus on the packet analysis tool Wireshark as well as the log analysis tool Splunk. You will also learn how to use a hex editor as well as some data decoding tools. What you get: The ability to demonstrate a base competency in packet and timeline analysis.

Tools and Technology

In this class, you will learn how to work an alert from initial triage to final resolution. As a part of triage, you will learn how to make risk-based decisions so you can prioritize work based on the potential impact. You will also work through some real-world examples and learn how to make recommendations on how to remediate the threat. What you get: The ability to make good, risk-based decisions and document your analysis for quality review.

Triage, Response, Analysis and Remediation

This final class in the cybersecurity program will test your ability to function in a real-life situation and validate your technical competency in a simulated workplace. You will be presented with a SOC Analyst’s daily workload and will be required to work through the alerts from triage to remediation. You will need to successfully work through at least three varying scenarios. What you get: An immersive, comprehensive reproduction of a day in the life of a working cyber security analyst, where you can put your new-found skills to the test.

Security Operations Center Simulation