CYBER ANALYST

The digital economy offers countries the potential of building global marketplace for cybersecurity expertise and related services. The Cyber Analyst program will equip learners with knowledge, skills, and experience for critical Analyst roles in Cybersecurity Operations, Threat Management , Cyber Literacy, Incident Response, and Governance Risk and Compliance.

Mode of Delivery: Online - This course will be delivered via Hybrid Flexible modality which includes interactive online lectures, online discussions, and practical demonstrations.

SKILLS & KNOWLEDGE

In the Classroom

  • Cyber Security Fundamentals and Frameworks

  • Threat Landscape and Threat Actors

  • Tools, Tactics and Procedures

  • Policies & Standards (NIST)

  • Cyber Literacy

  • Governance, Risk and Compliance

In the Toolbox

  • NordPass

  • NordVPN

  • Nessus

  • NMAP

  • Wireshark

  • Kali Linux

Ready for the Workplace

  • Security Operations and Monitoring

  • Intelligence and Threat Detection

  • Threat and Vulnerability Management

  • Incident Response and Recovery

WHAT WILL I LEARN?

Upon successful completion of this course, the students will have reliably demonstrated the ability to: 

  • Understand and become proficient with Cyber Security, including fundamentals and standards.

  • Comprehend and communicate the cyber threat landscape.

  • Understand, analyze, and respond to common cyber threats such as phishing, business email compromise, ransomware, and supply chain attacks.

  • Use tools, tactics, and procedures leveraged by threat actors. Demonstrate competence with penetration testing, vulnerability assessments, and open-source intelligence best practices.

  • Differentiate and understand external threats, cyber literacy, and threat assessment analyst roles and responsibilities.

  • Present and implement their learnings in real-life use cases.

Who Should do this Course

This course is designed for individuals who are 18 years or older have, completed secondary school and have a keen interest in computer science with basic proficiency in Microsoft Office Suite.

Important Information

Fees cover the cost of the program, the cost of the laptop; the cost of the software

Acceptance to the Programme is done in Three Stages

Stage One - Acceptance to Programme: Cyber Nations reviews applications, conducts PLUM assessments (valuates candidates' individual differences in understanding social cues and their ability to anticipate the impact that different actions may have on the feelings and impressions of others), and interviews, and notifies parties of the decision.

Stage Two – Funding: Funding Committee will review all applications to ensure applicants meet the necessary requirements and complete a security check.

Stage Three – Security Check: A security screening and reference checks will be completed prior to full acceptance into the program.

At a Glance

  • Admissions Term: Ongoing, Quarterly In-Take

  • Registration: Open

  • Time: Min. 30 hours per week

  • Duration: 4 Months

  • Certificate Awarded: Professional Development Certificate of Competence - Cyber Security Analyst

  • Course Code: PBRB.CYBER01

  • Capacity: TBD (Based on Employer Coalition Demand)

  • Cost: Varies based on region

  • The specifications for the required laptops needed for such programme

  • Windows 10 or 11

  • Microsoft Office 2010 or newer

  • Intel Core i7

  • 16GB Ram

  • 500GB - 1TB Solid State Drive

  • Web Camera & Microphone

Please note, if you have a laptop that meets these specifications and want to utilize it, special conditions applies.