Cyber Security Analyst Program Syllabus

CYBER SECURITY ANALYST

Official Training Program Syllabus

1. Program Overview

The Cyber Security Analyst program is a 6‑month blended learning experience combining:

  • 60 hours of live virtual instructor‑led training
  • 24/7 online self‑paced learning resources
  • Hands‑on labs, simulations, and case studies
  • Capstone project and portfolio development
  • Certification preparation (Security+, CySA+, CC, Azure Security)

This program prepares learners for roles such as Cybersecurity Analyst, SOC Analyst, Incident Response Analyst, Threat Intelligence Analyst, and Security Operations Engineer.

2. Learning Outcomes

Learners will be able to:

  • Analyze and secure networks, systems, and cloud environments
  • Perform threat detection, log analysis, and incident response
  • Use SIEM tools (Splunk, ELK, Azure Sentinel)
  • Conduct digital forensics and malware analysis
  • Implement security controls and hardening techniques
  • Build automation scripts using Python, Bash, and PowerShell
  • Apply NIST, ISO 27001, and Zero Trust frameworks
  • Produce professional security reports and IR playbooks
  • Build a cybersecurity portfolio for job readiness

3. 24/7 Online Self‑Paced Curriculum

Phase 0 — IT Foundations (Month 1)

Module 1: Computer Systems & OS

  • Computer hardware
  • Windows OS fundamentals
  • Linux basics
  • System monitoring

Module 2: Networking Fundamentals

  • OSI & TCP/IP models
  • Subnetting
  • DNS, DHCP, routing
  • Packet analysis

Module 3: Scripting & Automation

  • Python for security
  • PowerShell
  • Bash scripting

Phase 1 — Junior Cybersecurity Analyst (Months 2–7)

Course 1: Security Foundations

  • CIA triad
  • NIST & ISO 27001
  • Threat landscape

Course 2: Network Security & Monitoring

  • Firewalls & VPNs
  • SIEM concepts
  • IDS/IPS

Course 3: Incident Response & Forensics

  • IR frameworks
  • Disk & memory forensics
  • Malware analysis

Course 4: Cloud Security & DevSecOps

  • Cloud security models
  • IAM
  • CI/CD security

Phase 2 — Intermediate Analyst (Months 8–10)

Course 6: Advanced Threats

  • APT analysis
  • MITRE ATT&CK

Course 7: Governance & Security Program

  • Security program design

4. 60‑Hour Virtual Live Classroom Curriculum

Month 1 — Foundations (10 hours)

  • Windows & Linux admin labs
  • Networking labs (Wireshark, packet tracing)
  • Python live coding
  • Cloud setup workshop

Month 2 — Security Foundations (10 hours)

  • Risk assessment workshop
  • Threat intelligence mapping
  • Vulnerability scanning (Nessus/OpenVAS)
  • Security reporting

Month 3 — Network Security & SIEM (10 hours)

  • Firewall & VPN configuration
  • SIEM deployment (Splunk/ELK)
  • Log correlation workshop
  • PCAP forensics

Month 4 — Incident Response (10 hours)

  • IR tabletop exercises
  • Disk & memory forensics
  • Malware analysis
  • Threat hunting

Month 5 — Cloud & DevSecOps (10 hours)

  • Cloud hardening
  • IAM misconfigurations
  • CI/CD security
  • Container security

Month 6 — Advanced Security (10 hours)

  • Zero Trust design
  • SOAR automation
  • AI/ML security
  • Capstone project review

5. Assessment Structure

  • Weekly quizzes
  • Lab submissions
  • Mid‑program practical exam
  • Capstone project
  • Portfolio review
  • Mock interview

6. Capstone Project

Learners complete a real‑world project such as:

  • SOC investigation report
  • Incident response playbook
  • SIEM dashboard + detection rules
  • Cloud security hardening blueprint
  • Malware analysis report

7. Certification Roadmap

  • CompTIA Security+
  • CompTIA CySA+
  • Cisco CC
  • Microsoft SC‑900 / AZ‑500
  • ISC2 CC

8. Policies & Expectations

  • 80% attendance for live sessions
  • Mandatory lab completion
  • Academic integrity
  • Professional communication

© 2024 Cyber Security Analyst Training Program