Course Overview
Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.
Course Objectives
- Identify the purpose, benefits, and use of APIs.
- Understand the principles and concepts of DevOps, SecDevOps, and the CI/CD pipeline.
- Understand cybersecurity governance and alignment with business drivers.
- Establish effective cross-organizational communication for cybersecurity.
- Define roles and responsibilities for cybersecurity initiatives.
- Explore the threat landscape, including attack vectors and threat actors.
- Utilize threat intelligence sources effectively.
- Identify the components and techniques involved in incident detection, from data analytics to security logs and alerts.
- Gain proficiency in forensic analysis, malware analysis, network traffic analysis, packet analysis, and threat analysis for comprehensive incident response.
- Differentiate between the security needs of various industries based on the unique values assigned to digital assets and risk tolerance levels.
- Understand the principles and practices of identity and access management to ensure proper authorization and authentication.
Who Should Attend?
Cybersecurity professionals with 2-3 years of experience looking to enhance their technical skill set and address cybersecurity challenges more effectively. CCOA is an especially valuable credential for early-career security professionals looking to one day
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
Domain 1: Technology Essentials
- Networking
- System & Endpoint
- Applications
Domain 2: Cybersecurity Principles and Risk
- Cybersecurity Principles
- Cybersecurity Risk
Domain 3: Adversarial Tactics, Techniques, and Procedures
- Threat Landscape
- Means and Methods
Domain 4: Incident Detection and Response
- Incident Detection
- Incident Response
Domain 5: Securing Assets
- Controls
- Vulnerability Management