UTSA SECURITY ANALYST CERTIFICATION

Security Analysts Are On the Frontline of Cybersecurity

To be a successful security analyst, you’ll not only need a basic understanding of terminology, methodology and countermeasures, but you require practical skills with security systems, offensive security and incident response.

The Security Analyst Certification training in the UTSA Carlos Alvarez College of Business aligns with the CompTIA CySA+ Certification and will provide theoretical and practical hands-on training for beginners with limited or no prior experience, or information technology professionals looking to upskill.

Cybersecurity Occupational Outlook

According to the U.S. Bureau of Labor Statistics; security analyst’s Occupational Outlook Handbook,
Cybersecurity is one of the fastest growing careers and jobs are
projected to grow 31% through 2029.

Why Cybersecurity at UTSA?

The University of Texas at San Antonio is the place to be for hands-on and practical cybersecurity education and training.

The Alvarez College of Business has been offering cybersecurity classes since 2001. Our programs are led by world-class researchers and academics, as well as adjuncts who work in security and understand the needs of industry.

  • Largest cybersecurity ecosystem in the U.S. outside of Metro D.C.
  • 1 ranked security program in the nation
  • Top 100 Research Institution (UT Dallas Research Rankings 2015-2019)
  • Home to the National Security Collaboration Center (NSCC) and four nationally recognized research centers
  • San Antonio has the nation’s second-largest concentration of cybersecurity experts
  • Texas has the most cybersecurity growth potential in the U.S. (Business Facilities’ 15th Annual Rankings Report)

Who Should Attend Security Analyst Training?

The Security Analyst Certification Course is recommended for any individual looking to enter the industry or interested in upskilling to advance their career in cybersecurity.

Organizations can benefit by using this course to help keep their team’s knowledge and skills current as the threat landscape continues to rapidly evolve.

Course Objectives

Our course curriculum is aligned with the CompTIA CySA+ Certification and focuses on building knowledge and providing hands-on learning in five domains:

  1. Threat and Vulnerability Management: Topics include assessment and management of a range of threats and vulnerabilities from physical systems to the cloud.
  2. Software and Systems Security: Topics include system infrastructure, security solutions and secure coding.
  3. Security Operations and Monitoring: Topics include security monitoring, endpoint analysis, network analysis, threat hunting and automation concepts.
  4. Incident Response: Topics include analyzing potential indicators of compromise (IOCs), basic digital forensics and incident response process.
  5. Compliance and Assessment: Topics include data privacy and protection and risk mitigation. The course wraps up with security frameworks, policies, procedures and controls.

Get the Certification that Companies Are Looking For

Class Format & Fee
100% Live Remote Online
$3,000 – Group Discounts Available
Daytime Cohort
Tuesdays and Thursdays
October 5 – November 9, 2021
9 a.m. – 12:30 p.m. CT
Evening Cohort
Mondays and Wednesdays
October 4 – November 8, 2021
6 – 9:30 p.m. CT

Security Analyst Curriculum

1.0 Threat and Vulnerability Management

Threat Intelligence
• Open-source intelligence
• WEBINT
• Closed Sources
• Deep/ Dark Net
• Threat Actors
• Intelligence Cycle
• IOCs and TTPs
• Indicator Management
• Attack frameworks – MITRE ATT&CK, Kill Chain, Diamond Model
 
Vulnerability Management
• Vulnerabilities, Exploits
• CVSS
• Vulnerability Identification
• Scanning Parameters
• Vulnerabilities Remediation/Mitigation
 
Vulnerability Assessment Tools
• Enumeration
• Web Application Scanners
• Vulnerability scanners
• Software Assessment
• Wireless Assessment
• Cloud Infrastructure Assessment
 
Technologies, Threats and Vulnerabilities
• Mobile
• Internet of Things (IoT)
• Embedded
• Real-time OS
• System-on-Chip
• Physical Access
• Vehicles and Drones
• Industrial Control System (ICS)
 
Cyber Attacks
• Web Attacks
• Overflows
• Remote Code Execution
• Privilege Escalation
• Lateral Movement
• Password Attacks
• Malware
• Vulnerability Types
 
Infrastructure
• Servers and Data Centers
• Windows Domain
• Cloud vs. On-premises
• Asset Management
• Segmentation
• Network Architectures
• Virtualization
• Containerization
 
Security Solutions
• Encryption
• Endpoint Security
• Identity and Access Management (IAM)
• Network Security
• Logging and Monitoring
 
Secure Coding
• Platforms
• Secure Software Development Life Cycle (SSDLC(
• DevOps
• Secure Coding Best Practices
Security Monitoring
• Logs Review
• Auditing and Logging
• Parsing, Fields and Aggregation
• Collectors and Source Logs
• Security Information and Event Management (SIEM)
 
Endpoint Analysis
• Malware Behavior
• Memory
• File System
• User and Entity Behavior Analysis (UEBA)
• Email Analysis
• DLP
• XDR
• Sandboxing
 
Network Analysis
• Application Protocols
• Wireshare and PCAP Analysis
• TCP Dump
• Firewalls
• IDS/IPS
• NAC
 
Threat Hunting
• Establishing a Hypothesis
• Profiling Threats
• Threat Hunting Tactics
• Bundling Critical Assets
• Attack Vectors
• Integrated Intelligence
• Improving Detection Capabilities
 
Automation Concepts
• Security Orchestration, Automation and Response (SOAR)
• Scripting
• Threat Feed
• Behavior Analytics
Incident Response Process
• Preparation
• Detection Analysis
• Containment
• Eradication
• Recovery
• Post-Incident Activities
 
Analyze Potential IOCs
• Network Related IOCs
• Files and Hash
• Registry
• Application Related IOCs
 
Basic Digital Forensics
• Data Acquisition
• Network Analysis
• Host Forensics
• Mobile
• Cloud
• Data Carving
 
Data Privacy and Protection
• Privacy vs. Security
• Non-Technical Controls
• Technical Controls
• Data Privacy Regulations
 
Risk Mitigation
• Business Impact Analysis
• Risk Identification Process
• Risk Calculation
• Communication of Risk Factors
• Risk Prioritization
• Supply Chain Assessment
 
Frameworks, Policies, Procedures and Controls
• Security Frameworks
• Policies and Procedures
• Control Types
• Audit and Assessment
 

Need more Information?

Ready to start?

Book A Live Demo