Skip to Scheduled Dates
Course Overview
Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.
Who Should Attend
Cybersecurity professionals with 2-3 years of experience looking to enhance their technical skill set and address cybersecurity challenges more effectively. CCOA is an especially valuable credential for early-career security professionals looking to one day
Course Objectives
- Identify the purpose, benefits, and use of APIs.
- Understand the principles and concepts of DevOps, SecDevOps, and the CI/CD pipeline.
- Understand cybersecurity governance and alignment with business drivers.
- Establish effective cross-organizational communication for cybersecurity.
- Define roles and responsibilities for cybersecurity initiatives.
- Explore the threat landscape, including attack vectors and threat actors.
- Utilize threat intelligence sources effectively.
- Identify the components and techniques involved in incident detection, from data analytics to security logs and alerts.
- Gain proficiency in forensic analysis, malware analysis, network traffic analysis, packet analysis, and threat analysis for comprehensive incident response.
- Differentiate between the security needs of various industries based on the unique values assigned to digital assets and risk tolerance levels.
- Understand the principles and practices of identity and access management to ensure proper authorization and authentication.
Course Outline
Domain 1: Technology Essentials
- Networking
- System & Endpoint
- Applications
Domain 2: Cybersecurity Principles and Risk
- Cybersecurity Principles
- Cybersecurity Risk
Domain 3: Adversarial Tactics, Techniques, and Procedures
- Threat Landscape
- Means and Methods
Domain 4: Incident Detection and Response
- Incident Detection
- Incident Response
Domain 5: Securing Assets
- Controls
- Vulnerability Management