Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Security Analyst Nanodegree Program

Course Cover
compare button icon
Course Report - Security Analyst Nanodegree Program

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

4 months

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

10 hours per week

icon

Teaching Type

Self Paced

Course Description

Global cybersecurity market currently stands at $173 billion in 2020 and will grow to $270 billion by 2026. To help you capitalize on the increasing demand for information security analysts, the Security Analyst Nanodegree program has been created. You can meet the growing demand for cybersecurity professionals who have been trained to protect an organization's computers networks and systems.

You will learn the skills required to be a successful security analyst. You will learn how to spot, correct, and respond to security incidents and weaknesses. You will also gain hands-on experience monitoring network traffic and analyzing log data to identify and correct security weaknesses.

Course Overview

projects-img

Job Assistance

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

Prerequisites/Requirements

Be able to use Python as scripting language and SQL in order to run queries from Log data

Be familiar with security fundamentals including core security principles, critical security controls and best practices for securing information

Be knowledgeable in database design, large database systems, networking and operating systems

Have a basic understanding of client-server architecture

Have experience using Unix or Linux command line

Have familiarity with reading and creating simple network architecture diagrams

What You Will Learn

About the OWASP Top 10 and that they pose a critical threat to organizations

All of the ways to mitigate threats, including the OWASP Top 10

Analyze automated alerts for false positives and determine if they represent a real security threat

Apply security concepts to create defensible, resilient network architecture

Core principles and philosophy that drive work in the security field

Exploring the current threat landscape and identifying both threats and threat actors that organizations face

How to measure the risks associated with discovered vulnerabilities

Learn about vulnerabilities, their characteristics and their dynamic lifecycle

Learn what threat modeling is and build your own threat models

Physical, logical and administrative controls, their industry recognized frameworks, and how to apply them to secure a network, system or application

Target Students

Cyber security Analysts

Developers who already use SQL and Python and have a basic understanding of network infrastructure

Security Analysts

Security Engineers

Course Instructors

Author Image

Chris Herdt

Security Analyst Iii

Chris is a Security Analyst at the University of Minnesota and an Adjunct Instructor at Dunwoody College, specializing in network security, web application security and Linux operating system securit...
Author Image

Milind Adari

Security Engineer

Milind Adari is a Security Engineer at The Associated Press and an Adjunct Instructor at Columbia University. He is responsible for protecting journalists all around the world from malicious threat a...
Author Image

Richard Phung

Information Security Analyst

Richard is an SSCP and CISSP with over a decade of enterprise systems administration experience, working with businesses to meet the demands of a continually evolving threat landscape. Richard holds ...
Course Cover