CYBER ANALYST
SKILLS & KNOWLEDGE
In the Classroom
Cyber Security Fundamentals and Frameworks
Threat Landscape and Threat Actors
Tools, Tactics and Procedures
Policies & Standards (NIST)
Cyber Literacy
Governance, Risk and Compliance
In the Toolbox
NordPass
NordVPN
Nessus
NMAP
Wireshark
Kali Linux
Ready for the Workplace
Security Operations and Monitoring
Intelligence and Threat Detection
Threat and Vulnerability Management
Incident Response and Recovery
WHAT WILL I LEARN?
Upon successful completion of this course, the students will have reliably demonstrated the ability to:
Understand and become proficient with Cyber Security, including fundamentals and standards.
Comprehend and communicate the cyber threat landscape.
Understand, analyze, and respond to common cyber threats such as phishing, business email compromise, ransomware, and supply chain attacks.
Use tools, tactics, and procedures leveraged by threat actors. Demonstrate competence with penetration testing, vulnerability assessments, and open-source intelligence best practices.
Differentiate and understand external threats, cyber literacy, and threat assessment analyst roles and responsibilities.
Present and implement their learnings in real-life use cases.
Who Should do this Course
This course is designed for individuals who are 18 years or older have, completed secondary school and have a keen interest in computer science with basic proficiency in Microsoft Office Suite.
Important Information
Fees cover the cost of the program, the cost of the laptop; the cost of the software
Acceptance to the Programme is done in Three Stages
Stage One - Acceptance to Programme: Cyber Nations reviews applications, conducts PLUM assessments (valuates candidates' individual differences in understanding social cues and their ability to anticipate the impact that different actions may have on the feelings and impressions of others), and interviews, and notifies parties of the decision.
Stage Two – Funding: Funding Committee will review all applications to ensure applicants meet the necessary requirements and complete a security check.
Stage Three – Security Check: A security screening and reference checks will be completed prior to full acceptance into the program.
At a Glance
Admissions Term: Ongoing, Quarterly In-Take
Registration: Open
Time: Min. 30 hours per week
Duration: 4 Months
Certificate Awarded: Professional Development Certificate of Competence - Cyber Security Analyst
Course Code: PBRB.CYBER01
Capacity: TBD (Based on Employer Coalition Demand)
Cost: Varies based on region
The specifications for the required laptops needed for such programme
Windows 10 or 11
Microsoft Office 2010 or newer
Intel Core i7
16GB Ram
500GB - 1TB Solid State Drive
Web Camera & Microphone
Please note, if you have a laptop that meets these specifications and want to utilize it, special conditions applies.