fbpx
Update: UTSA's ongoing monitoring of the Coronavirus outbreak

Image of security operations center

Security Analysts Are On the Frontline of Cybersecurity

To be a successful security analyst, you’ll not only need a basic understanding of terminology, methodology and countermeasures, but you require practical skills with security systems, offensive security and incident response.

The Security Analyst Certification training in the UTSA Carlos Alvarez College of Business aligns with the CompTIA CySA+ Certification and will provide theoretical and practical hands-on training for beginners with limited or no prior experience, or information technology professionals looking to upskill.

Cybersecurity Occupational Outlook

According to the U.S. Bureau of Labor Statistics; security analyst’s Occupational Outlook Handbook, cybersecurity is one of the fastest growing careers and jobs are projected to grow 31% through 2029.

Why Cybersecurity at UTSA?

The University of Texas at San Antonio is the place to be for hands-on and practical cybersecurity education and training.

The Alvarez College of Business has been offering cybersecurity classes since 2001. Our programs are led by world-class researchers and academics, as well as adjuncts who work in security and understand the needs of industry.

  • Largest cybersecurity ecosystem in the U.S. outside of Metro D.C.
  • 1 ranked security program in the nation
  • Top 100 Research Institution (UT Dallas Research Rankings 2015-2019)
  • Home to the National Security Collaboration Center (NSCC) and four nationally recognized research centers
  • San Antonio has the nation’s second-largest concentration of cybersecurity experts
  • Texas has the most cybersecurity growth potential in the U.S. (Business Facilities’ 15th Annual Rankings Report)

Who Should Attend Security Analyst Training?

The Security Analyst Certification Course is recommended for any individual looking to enter the industry or interested in upskilling to advance their career in cybersecurity.

Organizations can benefit by using this course to help keep their team’s knowledge and skills current as the threat landscape continues to rapidly evolve.

Image of lady at computer

Course Objectives

Our course curriculum is aligned with the CompTIA CySA+ Certification and focuses on building knowledge and providing hands-on learning in five domains:

  1. Threat and Vulnerability Management: Topics include assessment and management of a range of threats and vulnerabilities from physical systems to the cloud.
  2. Software and Systems Security: Topics include system infrastructure, security solutions and secure coding.
  3. Security Operations and Monitoring: Topics include security monitoring, endpoint analysis, network analysis, threat hunting and automation concepts.
  4. Incident Response: Topics include analyzing potential indicators of compromise (IOCs), basic digital forensics and incident response process.
  5. Compliance and Assessment: Topics include data privacy and protection and risk mitigation. The course wraps up with security frameworks, policies, procedures and controls.

Get the Certification that Companies Are Looking For
Class Format and Cost
100% Live Remote Online
$3,000 – Early Bird and Group Discounts Available
Daytime Cohort
Tuesdays and Thursdays
October 5 – November 9, 2021
9 a.m. – 12:30 p.m. CT
Evening Cohort
Mondays and Wednesdays
October 4 – November 8, 2021
6 – 9:30 p.m. CT

Security Analyst Curriculum

Threat Intelligence

  • Open-source intelligence
  • WEBINT
  • Closed Sources
  • Deep/ Dark Net
  • Threat Actors
  • Intelligence Cycle
  • IOCs and TTPs
  • Indicator Management
  • Attack frameworks – MITRE ATT&CK, Kill Chain, Diamond Model

Vulnerability Management

  • Vulnerabilities, Exploits
  • CVSS
  • Vulnerability Identification
  • Scanning Parameters
  • Vulnerabilities Remediation/Mitigation

Vulnerability Assessment Tools

  • Enumeration
  • Web Application Scanners
  • Vulnerability scanners
  • Software Assessment
  • Wireless Assessment
  • Cloud Infrastructure Assessment

Technologies, Threats and Vulnerabilities

  • Mobile
  • Internet of Things (IoT)
  • Embedded
  • Real-time OS
  • System-on-Chip
  • Physical Access
  • Vehicles and Drones
  • Industrial Control System (ICS)

Cyber Attacks

  • Web Attacks
  • Overflows
  • Remote Code Execution
  • Privilege Escalation
  • Lateral Movement
  • Password Attacks
  • Malware
  • Vulnerability Types

Infrastructure

  • Servers and Data Centers
  • Windows Domain
  • Cloud vs. On-premises
  • Asset Management
  • Segmentation
  • Network Architectures
  • Virtualization
  • Containerization

Security Solutions

  • Encryption
  • Endpoint Security
  • Identity and Access Management (IAM)
  • Network Security
  • Logging and Monitoring

Secure Coding

  • Platforms
  • Secure Software Development Life Cycle (SSDLC(
  • DevOps
  • Secure Coding Best Practices

Security Monitoring

  • Logs Review
  • Auditing and Logging
  • Parsing, Fields and Aggregation
  • Collectors and Source Logs
  • Security Information and Event Management (SIEM)

Endpoint Analysis

  • Malware Behavior
  • Memory
  • File System
  • User and Entity Behavior Analysis (UEBA)
  • Email Analysis
  • DLP
  • XDR
  • Sandboxing

Network Analysis

  • Application Protocols
  • Wireshare and PCAP Analysis
  • TCP Dump
  • Firewalls
  • IDS/IPS
  • NAC

Threat Hunting

  • Establishing a Hypothesis
  • Profiling Threats
  • Threat Hunting Tactics
  • Bundling Critical Assets
  • Attack Vectors
  • Integrated Intelligence
  • Improving Detection Capabilities

Automation Concepts

  • Security Orchestration, Automation and Response (SOAR)
  • Scripting
  • Threat Feed
  • Behavior Analytics

Incident Response Process

  • Preparation
  • Detection Analysis
  • Containment
  • Eradication
  • Recovery
  • Post-Incident Activities

Analyze Potential IOCs

  • Network Related IOCs
  • Files and Hash
  • Registry
  • Application Related IOCs

Basic Digital Forensics

  • Data Acquisition
  • Network Analysis
  • Host Forensics
  • Mobile
  • Cloud
  • Data Carving

Data Privacy and Protection

  • Privacy vs. Security
  • Non-Technical Controls
  • Technical Controls
  • Data Privacy Regulations

Risk Mitigation

  • Business Impact Analysis
  • Risk Identification Process
  • Risk Calculation
  • Communication of Risk Factors
  • Risk Prioritization
  • Supply Chain Assessment

Frameworks, Policies, Procedures and Controls

  • Security Frameworks
  • Policies and Procedures
  • Control Types
  • Audit and Assessment

 


Get Program Information
Name(Required)
Please let us know if you have any additional questions.
This field is for validation purposes and should be left unchanged.

In partnership with:

X