Course Summary
This apprenticeship is federal/state registered
Credit Type:
Occupation Title:
Cybersecurity Analyst
Type of Apprenticeship Program:
Estimated length of On the Job Training (OJT):
2000 hours or 1 year
Estimated length of Related Training Instruction (RTI):
441 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 Business Communications
Lower-Division Baccalaureate 3 Decision Making
Lower-Division Baccalaureate 3 Introduction to programming
Lower-Division Baccalaureate 3 Introduction to Python programming
Lower-Division Baccalaureate 3 Networking fundamentals
Lower-Division Baccalaureate 3 Networking Security
Lower-Division Baccalaureate 3 Active Directory administration
Lower-Division Baccalaureate 3 Cyber security essentials I
Lower-Division Baccalaureate 3 Introduction to cyber security
Lower-Division Baccalaureate 3 Cyber security administration
Lower-Division Baccalaureate 3 Cyber security analysis
Lower-Division Baccalaureate 3 Information Security Management
Lower-Division Baccalaureate 3 Incident handling
Lower-Division Baccalaureate 3 Risk management
Lower-Division Baccalaureate 3 Computer Applications
Lower-Division Baccalaureate 3 Computer information systems

Occupation Description:

Information and Data are some of the most important organizational assets in today’s businesses. Cybersecurity Analysts are key advisors for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. They apply technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. Cybersecurity Analysts work to ensure a company's computer network is safe from cyber attacks, whether internal or external. As the variety and number of cyber attacks increases, the knowledge required to be an effective analyst will shift and change. Therefore, a major responsibility is to conduct research and stay current on the latest issues affecting the industry.

Program Description:

As a Cybersecurity Analyst apprentice at IBM, apprentices have the opportunity to apply technical knowledge using the latest tools and technologies in supporting and preventing cyber threats for our clients. The Cybersecurity Analyst apprenticeship includes micro-credentials like professional skills, agile development, and design thinking. The program also includes a broad range of fundamental skills in networking, IT systems, cybersecurity awareness, QRadar foundations, intrusion detection system foundations, Guardium foundations, application scanning, McAfee foundations, compliance foundations, risk management, Security+, and NIST. The program is a great pathway for a career as a Cybersecurity Analyst as well as Security Consultant, data security, security compliance, and Security Operations Center (SOC) Engineer.

Program Objective:

The objective of this course is to prepare students for a career as a Cybersecurity Analyst at IBM.

Learning Outcomes:

  • create programs using fundamental concepts
  • identify programming's role in cyber operations
  • create flow charts and design and implement pseudo-code to solve problems
  • identify variable types and strings; analyze, create and compile programs
  • describe the use of classes and objects in programming; and explain vectors and create functions in programming languages
  • utilize the Python programming language format and structure in coding
  • understand and utilize Python programming concepts, including lists, dictionaries, classes, and loops
  • use Python libraries and tools
  • debug basic Python programs
  • employ Python as a means for developing information security tools
  • define networking basics to include LAN, cabling and Ethernet
  • perform networking addressing
  • explain network communication protocols
  • define and apply the Open System Interconnection (OSI) model and Transmission Control Protocol/Internet Protocol (TCP/IP) to define data layers
  • perform basic network troubleshooting
  • employ IPv4 and IPv6 addresses and subnet masks
  • perform troubleshooting techniques
  • configure domain controllers
  • manage Active Directory users and computers
  • manage Active Directory groups and organizational units
  • configure service and authentication account policies
  • maintain Active Directory
  • implement group policy objects (GPOs)
  • administer group policy settings
  • manage certificates
  • administer Active Directory Federation Services (AD FS) and Active Directory Rights Management Services (AD RMS)
  • implement web application proxy (WAP)
  • identify security essentials that support system and network integrity
  • identify hacker techniques, exploits, and incident handling
  • create user login, platform, and equipment key tag, and assign keys to equipment
  • perform account management
  • create and maintain incident tracking information
  • plan, coordinate, and direct recovery activity
  • apply security practices to routers, switches and networks
  • install, configure and manage malware detection software
  • deploy security tools in defense of computer systems and networks, including firewalls and intrusion detection software
  • monitor networks to detect denial of service (DOS), malware and rootkit attacks
  • perform network security risk analysis
  • mitigate external and internal security attack potential
  • manage secure voice data communications
  • evaluate and mitigate cyber threats
  • employ security for storage area networks (SAN)
  • configure secure virtual switching
  • configure password management protocols, and develop user and group policies
  • identify the importance of risk management in networking
  • assess and mitigate network risk
  • assess and mitigate network risk
  • implement security activities throughout the technology life cycle
  • determine industry trends and effects on the enterprise
  • detect, protect, and mitigate cyber intrusions
  • determine attribution and mitigation strategies
  • identify tactics, techniques, and procedures of intrusion attackers
  • develop a risk management plan
  • summarize the process involved in information technology (IT) security management, deploy resources such as intrusion detection and intrusion prevention systems, for damage assessment, data forensics and attack vectors
  • perform auditing functions on processes and logs, and prioritize recovery operations for continuity of operations
  • identify the required physical, personal, and procedural security for an automated information system
  • identify threats to information assurance
  • perform physical security of computer hardware and software
  • develop enforceable security policies, and implement procedures to prevent fraud, waste, and abuse
  • configure peer-to-peer networks and security settings on proxy servers
  • set up and configure firewall servers
  • test and configure intrusion detection systems
  • perform auditing
  • control wireless access points
  • identify and rectify wireless system intrusion
  • develop risk management plans
  • identify and evaluate the coexistence of a threat and a point of vulnerability
  • communicate risks effectively to appropriate stakeholders
  • monitor and control identified and emerging risks
  • use multiple risk management techniques to identify and document risks
  • use creative thinking to solve problems
  • develop strategies for risk analysis and risk mitigation
  • conduct situational analysis
  • use decision support systems
  • conduct backward planning
  • allocate resources to resolve problems
  • apply ethics to problem solving
  • demonstrate presentation skills
  • prepare effective business messages for culturally diverse audiences
  • communicate by written, oral, and visual methods
  • compose clean and concise business letters, reports, memoranda, and emails
  • create, organize, and manage electronic files and folders
  • create, modify, and maintain a word processing, spreadsheet, database, and presentation documents
  • use functions, formulas, and charts in documents, spreadsheets, and databases
  • utilize applications and terminology effectively
  • describe basic concepts of information systems and computer networks
  • demonstrate knowledge of computer applications suite
  • demonstrate the use of Internet and email tools
  • apply the use of computers in a variety of environments
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Case Studies
  • Classroom Exercise
  • Computer Based Training
  • Discussion
  • Laboratory
  • Lectures
  • Practical Exercises
  • Work-based Learning

Methods of Assessment:

  • Examinations
  • Performance Rubrics (Checklists)
  • Quizzes
Supplemental Materials