Certified Cybersecurity Operations Analyst (CCOA)

Course Overview

Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.

Who Should Attend

Cybersecurity professionals with 2-3 years of experience looking to enhance their technical skill set and address cybersecurity challenges more effectively. CCOA is an especially valuable credential for early-career security professionals looking to one day

Course Objectives

    • Identify the purpose, benefits, and use of APIs.
    • Understand the principles and concepts of DevOps, SecDevOps, and the CI/CD pipeline.
    • Understand cybersecurity governance and alignment with business drivers.
    • Establish effective cross-organizational communication for cybersecurity.
    • Define roles and responsibilities for cybersecurity initiatives.
    • Explore the threat landscape, including attack vectors and threat actors.
    • Utilize threat intelligence sources effectively.
    • Identify the components and techniques involved in incident detection, from data analytics to security logs and alerts.
    • Gain proficiency in forensic analysis, malware analysis, network traffic analysis, packet analysis, and threat analysis for comprehensive incident response.
    • Differentiate between the security needs of various industries based on the unique values assigned to digital assets and risk tolerance levels.
    • Understand the principles and practices of identity and access management to ensure proper authorization and authentication.

Course Outline

Domain 1: Technology Essentials

  • Networking
  • System & Endpoint
  • Applications

Domain 2: Cybersecurity Principles and Risk

  • Cybersecurity Principles
  • Cybersecurity Risk

Domain 3: Adversarial Tactics, Techniques, and Procedures

  • Threat Landscape
  • Means and Methods

Domain 4: Incident Detection and Response

  • Incident Detection
  • Incident Response

Domain 5: Securing Assets

  • Controls
  • Vulnerability Management

< Back to Search

Class Dates & Times

Class times are listed Central time

This course is This is a 5-day class days

Price: $3,250.00

Class dates not listed.
Please contact us for available dates and times.