Course Summary
Credit Type:
41.5 hours and 32 lab hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 3 security analyst


The course objective is to prepare learners for the various security roles that play a big part in keeping organizations secure. The course starts by providing potential Security Analysts with foundational knowledge on the planning and implementation of security measures that combat risks associated with cloud, AI, and machine learning solutions. Skilled Security Analysts can dive in and start working on their Forensics Analyst skills by exploring different methods of discovery, collection, and remediation. From there, learners move into the Vulnerability Analyst role that focuses more on continual testing and hardening of all security layers. The final part of the course prepares learners to become Security Architects by bringing together all the insights and knowledge acquired throughout the course to model system security, implement governance policies, and create secure infrastructure design and self-healing systems.

Learning Outcomes:

  • explain auditing and incident response
  • describe the security protocols and their uses
  • secure end users against attackers
  • become familiar secure coding concepts
  • explain defensible architecture and zero-trust models
  • automate the responses to security incidents
  • integrate regulations with organizational security policies
  • create a data breach response plan
  • describe how a security Playbook is implemented.
  • explain session and risk management
  • identify security threats and know how to protect your information
  • identify APT attacks and ATP defense best practices
  • understand the importance of NACs and Gateways
  • understand Subnetting and DNS for Security Architects
  • list the advantages and disadvantages of different security topologies
  • explain the importance of implementing security governance in an organization
  • install and configure honeypots
  • describe pen testing concepts in detail
  • detect and address network anomalies
  • list digital forensic techniques and investigative approaches
  • describe risk management concepts and how to assess, categorize, monitor, and respond to organizational risks
  • list techniques used to perform software security assessments and testing, and also cybersecurity audits
  • describe what cryptography services and PKI are used for
  • manage threats and vulnerabilities
  • list IDS/IPS best practices
  • describe practices for authentication and encryption
  • explain how to develop secure networks
  • list techniques for incident tracking and response
  • understand the Rules of Engagement (RoE)
  • list Ethical Hacking best practices
  • implement security incident triage

General Topics:

  • Information security: APT defenses
  • Information security: NACs and gateways
  • Information security: subnetting and DNS for security architects
  • Information security: securing networking protocols
  • Information security: hardened security topologies
  • Information security: continual infrastructure testing
  • Information security: security governance
  • Information security: honeypots
  • Information security: pen testing
  • Session and risk management
  • Auditing and incident response
  • An executive's guide to security: understanding security threats
  • An executive's guide to security: protecting your information
  • Anomaly detection: aspects of anomaly detection
  • Anomaly detection: network anomaly detection
  • Cryptography: introduction to cryptography services
  • Cryptography: introduction to PKI
  • Digital forensic techniques and investigative approaches
  • Ethics and privacy: digital forensics
  • End-user security: the end-user perspective
  • End-user security: the security administrator perspective
  • End-user security: securing end users against attackers
  • Risk analysis: security risk management
  • Cyber security audits
  • Security software assessments
  • Authentication and encryption: best practices
  • Security topologies: developing secure networks
  • Intrusion detection: best practices
  • Intrusion prevention: best practices
  • Defensible security
  • Security architect: secure coding concepts
  • Incident tracking and response
  • Security vulnerabilities: managing threats and vulnerabilities
  • Data security breach notification process
  • Security architect: ethical hacking best practices
  • Intelligent orchestration: automating security incident processing
  • Security program regulatory integration
  • Security rules: rules of engagement
  • Security incident triage
  • Unified security: playbook approach to security
  • Security architect
  • Building a leadership development plan
  • Aligning unit goals and imperatives
  • Positive atmosphere: how organizational learning drives positive change
Instruction & Assessment

Instructional Strategies:

  • Computer Based Training
  • Laboratory
  • Practical Exercises

Methods of Assessment:

  • Examinations
  • Quizzes

Minimum Passing Score:

Supplemental Materials