The Cyber Defense Analyst Career Path gives guidance, knowledge, and proficiency in the core skills necessary for a career as a Cyber Defense Analyst. The Career Path will have a structured curriculum with specialized learning activities that will give you real-world training on Security Policies, Log Collection and Analysis, Risk Management, Incident Response and Recovery, Threat Intelligence, Tool Development, Network Architecture, Vulnerability Identification and Analysis, IAM, Reporting, and Malware Identification and Analysis.The program is also aligned with the NIST Cybersecurity Framework, and you will learn how to be a Cyber Defense Analyst that uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

Test your knowledge and proficiency in the core skills needed for this career.

Cyber Defense Analyst Workrole Assessment

This assessment will test your knowledge and proficiency in the core skills necessary for the Cyber Defense Analyst work-role. The assessment will test your knowledge on Security Policies, Log Collection and Analysis, Risk Management, Incident Response and Recovery, Threat Intelligence, Tool Development, Network Architecture, Vulnerability Identification and Analysis, IAM, Reporting, and Malware Identification and Analysis. A Cyber Defense Analyst uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

TAKE ASSESSMENT

Feel confident you are learning with the best

After having helped grow the careers of 2.5 million cybersecurity professionals around the world and individuals from thousands of companies, be rest assured you are choosing the right program from a provider with the track-record to show for it.

video cyb icon

Expertly crafted curriculum aligned to your experience and career goals

virtual lab icon cyb

In-browser virtual environments and challenges to give you real experience and practical skills

chat icon cyb

Connect and chat with a dedicated mentor to guide you throughout your journey

resume prep cyb icon

Prepare for the interview and finish the program with further career development guidance

Labs

Perform a Network Vulnerability Assessment Using NmapIdentify Non-secure Network Traffic Automate and Monitor VMs Using Extensions and Azure MonitorImplement Azure VM Network SecurityMonitor a Web AppConfigure Windows Firewall ACL RulesIdentify Attack TypesManaging Log Files on a Windows ServerStore and Analyze IoT DataCompTIA Security+ 501CompTIA Security+ SY0-501Host Data Integrity BaseliningEvent Log CollectionLog CorrelationLog Correlation & Analysis to Identify Potential IOCLog Correlation and AnalysisConduct Log Analysis and Cross Examination for False PositivesLog Event ReportsWiresharkApplying Filters to TCPDump and WiresharkCentralized MonitoringCreating SIEM Reports with SplunkIdentify and Remove Trojan Using Various ToolsIdentify Rootkit and DLL Injection ActivityIdentify Whether High-Risk Systems Were AffectedIdentifying Intrusion and Mitigating Attacks with RHEL ServerIdentifying Malicious Network ConnectionsCheck for Indicators of Other Attack Activity (Debug PE File)Analyze SQL Injection AttackAnalyze Various Data Sources to Confirm Suspected InfectionAnalyze and Classify MalwareAnalyze Malicious Activity in Memory Using VolatilityAnalyze Structured Exception Handler Buffer Overflow ExploitMicrosoft Baseline Security AnalyzerUse pfTop to Analyze Network TrafficUsing PowerShell to Analyze a SystemIntroduction To OWASP Top Ten: A1 - Injection - ScoredIntroduction To OWASP Top Ten: A2 - Broken Authentication - ScoredIntroduction To OWASP Top Ten: A3 - Sensitive Data Exposure - ScoredIntroduction To OWASP Top Ten: A4 - XML External Entities - ScoredIntroduction To OWASP Top Ten: A5 - Broken Access Control - ScoredIntroduction To OWASP Top Ten: A6 - Security Misconfiguration - ScoredIntroduction To OWASP Top Ten: A7 - Cross Site Scripting - ScoredIntroduction To OWASP Top Ten: A8 - Insecure Deserialization - ScoredIntroduction To OWASP Top Ten: A9 - Using Components With Known Vulnerabilities - ScoredIntroduction To OWASP Top Ten: A10 - Insufficient Logging and Monitoring - ScoredIntroduction To OWASP Top Ten: Capstone - ScoredXSS StoredXSS ReflectedSQL InjectionWASE Learning - Insecure DeserializationWASE Learning - XML External EntitiesWebApp Attack PCAP AnalysisThreat DesignationManually Analyze Malicious PDF DocumentsManually Analyze Malicious PDF Documents 2RootKit

Assessments

Enroll Now

Program Starts On October 22nd