The increasingly complex world of the Internet of Things requires professionals with a high-level understanding of risks, to keep businesses’ IT systems secure.
The Cyber Security Analyst Programis an online professional development program that will provide you with the skills and knowledge required to analyse and secure IT assets at both the hardware and software levels.
In this cyber security course, you will learn how to investigate security incidents, install security measures, and operate software to reduce vulnerabilities. You will analyse information infrastructure and install firewalls and data encryption programs to protect systems. You will also learn about malware, the value of security mitigations, how to use digital forensic tools, and when and where to use HIDS, NIDS and NIPS.
On completion of this course, you will have the valuable skills and knowledge to assist organisations with avoiding the disruption of business operations and alleviate potential financial and reputational loss.
Unit 1 -Investigate security incidents
Creating a firewall
How packet filters work
Packet filtering firewall configuration
Web application firewalls
Intrusion detection and prevention
Using HIDS, NIDS and NIPS
Identifying viruses and worms
Identity spyware and adware
Using ransomware works
Using antimalware solutions
Important security defences
Choosing forensic hardware and software
Common forensic tools
Conducting mobile device forensics
Creating a memory dump
Retrieve and view deleted files
Preventing threat materialization
Unit 2 - Monitoring for security issues
Creating new user accounts
Threats, vulnerabilities and exploits
Craft forged packets using free tools
Using impersonation to gain unauthorized access
Common exploit tools
Continuous monitoring and monitoring tools
Windows event log forwarding
Using SCADA and ICS
Trends in network usage
Specific types of logs
Vulnerabilities and exploits
Unit 3 - Network architecture and reconnaissance
Network hardware and software
Using specific network hardware
Configuring and troubleshooting TCP/IP
Configure and scan for service ports
Configure network services securely
Wired and wireless network concepts
Placement of network devices
Cloud computing and service models
Virtualization in cloud computing
Cloud security options
Using packet capturing tools
FTP and HTTP traffic
Social engineering techniques
Data ownership and retention policies
Data classification policies
Perform network reconnaissance
Unit 4 - Reducing vulnerabilities
Using crypto to secure data in the enterprise
Symmetric from asymmetric encryption
Asymmetric from symmetric encryption
File integrity maintenance
File integrity using Linux
File integrity using Windows
Using VPN connections
Centralized authentication using RADIUS
Scanning for vulnerabilities and scanning settings
Vulnerability scanning tools
Vulnerability scan results
Unit 5 - Threat identification
Assets and related threats
Recognising zero-day threats
Identify what constitutes PII
Payment card data
Using valuable data
Preventing data leakage
Effects of negative incidents
Incident response and incidence response roles
Incident disclosure options
Analyze host symptoms, network symptoms and application symptoms to determine the best response
identify positive learned outcomes resulting from incidents
Using OEM documentation
Up-to-date network documentation
Incident response plans
Integrity of collected evidence
SLA details are aligned with business needs
Designing an incident response plan
Unit 6 - Threat mitigation
Secure coding practices
Testing technology solutions
reduce the attack surface of a network host
Keeping hardware and software up to date
Apply patches to secure network hosts
File systems access
Controlling network access with NAC
Network segregation using VLANs
Creating vulnerable hosts to monitor malicious use
Creating a jump box
NIST’s Cybersecurity Framework
ISO security standards
TOGAF enterprise IT architecture
Physical security controls
Logical security controls
Router ACL rules to block ICMP traffic
Administrative security controls
Compensating security controls
Conducting penetration tests
Security controls and threat mitigations
When you study with Australian Online Courses, you will be assessed using a competency-based training method.
Competency-based training focuses on the achievement of skills and knowledge against set criteria to ensure your competency is industry relevant. You will not be benchmarked against other students.
If you do not achieve a competency result on your first attempt, you have two more attempts to pass your assessment. So, you have three attempts in total to obtain a competency result.
In this way, you can complete your course in your own time and at your own pace with the assistance of unlimited tutor support.
In this course, you will be assessed via multiple-choice questions to determine your mastery of details and specific knowledge gained during your studies to achieve a ‘competent’ or ‘not yet competent’ result.
Benefits of Multiple-Choice Assessments
Appropriate for assessing students’ mastery of details and specific knowledge.
Can be used to assess both simple knowledge and complex concepts.
Questions can be answered quickly to accurately assess a students’ mastery of many topics relatively quickly.
Assessment can be quickly and reliably scored to achieve a ‘competent’ or ‘not yet competent’ result.
As the answers are visible, multiple-choice questions offer the opportunity for the continuation of the learning process, offering educational value.
Was great, quick and easy learning, very happy 🙂 and will be back
T. Mante, Lane Cove North, NSW | Cyber Security Analyst Program\
Great experience. Would recommend
D. Urquhart, Ayr, QLD | Cyber Security Analyst Program
Why Choose Australian Online Courses?
Professional development that is widely recognised and respected;
Improve your employment opportunities;
Study online, anywhere via our elearning system;
High-quality professional development programs written by industry experts;
No entry requirements;
All course materials provided online – no textbooks to buy;
Unlimited tutor support;
Easy to understand course content;
We offer twelve (12) months’ access, with extensions available upon application (fees apply);
Certificate of Attainment/Completion issued for your CV (hard copy provided); and
Course may be tax deductible; see your tax advisor.
How long will it take to complete this course?
The approximate study hours for this course is 15 hours. We offer twelve (12) months’ access, with extensions available upon application (fees apply).
Can I purchase optional printed materials?
While printed materials are not available for purchase, transcripts of video lectures and other learning resources are available for printing via our elearning system.
When can I start this course?
You can start within 60 minutes during business hours when you enrol and pay in full with a credit card!
Credit card: Within 60 mins during business hours.
BPAY: Within 1-2 working days.
Internet Banking: Within 1-2 working days.
Cheque/Money Order: Upon receipt of mailed cheque.
Will I receive a certificate upon completion of this course?
Yes! You will receive a Certificate of Attainment upon successful completion of your assessment.
Do I need to attend classes or undertake any work placements?
No. All courses are delivered online via our e-learning system and there are no work placement requirements in this course.
What support can I expect from Australian Online Courses?
Unlimited tutor support is available throughout your studies via email during business hours Monday to Friday. Our Administrative team are available Monday to Friday via email, live chat and telephone.
I am an international student. Can I enrol into this course?
Yes! We accept enrolments from individuals both within Australia and internationally; location is no barrier to entry into our programs.