We may earn an affiliate commission when you visit our partners.
Course image
Richard Phung, Chris Herdt, and Milind Adari

Elevate your skills and expertise with our comprehensive Cyber Security Analyst Training. Explore the fundamentals of system defense and gain valuable insights.

Prerequisite details

To optimize your success in this program, we've created a list of prerequisites and recommendations to help you prepare for the curriculum. Prior to enrolling, you should have the following knowledge:

  • Cybersecurity fluency
  • Basic Python
  • Basic SQL

You will also need to be able to communicate fluently and professionally in written and spoken English.

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

This lesson is an introduction to the Security Analyst role and how that role fits into an organization.
This lesson provides the underlying philosophy and objectives for your work as an Analyst. Through real examples, you'll explore a variety of attack vectors and threat modeling strategies.
Read more
This lesson is a broad survey of the families of security controls and provides opportunities to work with some of the technical mechanisms used to prevent security challenges.
This lesson focuses on improving your organization's posture by applying control concepts to design infrastructure that is more resistant to intrusion.
For your final project, you will assume the role of an Information Security Analyst for an industrial manufacturing company located in the Midwest Unites States.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches fundamental cybersecurity concepts and control mechanisms
Builds a strong foundation for cybersecurity skills and expertise
Requires prerequisite knowledge in cybersecurity, Python, and SQL
Offers real-world examples to illustrate security concepts
Covers a wide range of topics, including threat modeling and security controls

Save this course

Save Fundamentals of Defending Systems to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Fundamentals of Defending Systems with these activities:
Review Cybersecurity basics
Reviewing cybersecurity fundamentals will help you grasp the concepts introduced in the course more easily.
Browse courses on Cybersecurity Principles
Show steps
  • Read an introductory book on cybersecurity
  • Watch online tutorials on basic security principles
  • Review notes or materials from previous cybersecurity courses
Show all one activities

Career center

Learners who complete Fundamentals of Defending Systems will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is a professional who works to protect an organization's information assets from cyberattacks and other threats. They do this by identifying and analyzing security risks, and developing and implementing security measures to mitigate those risks. This course can help you become a successful Information Security Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Security Engineer
A Security Engineer is a professional who works to design, implement, and maintain an organization's security systems. They work to ensure that the organization's computer systems and networks are secure from cyberattacks and other threats. This course can help you become a successful Security Engineer by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Security Analyst
A Security Analyst is a professional who works to protect an organization's computer systems and networks from cyberattacks. They do this by identifying and analyzing security risks, and developing and implementing security measures to mitigate those risks. This course can help you become a successful Security Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Data Protection Officer
A Data Protection Officer is a professional who is responsible for ensuring that an organization's data is protected from unauthorized access, use, disclosure, or destruction. They work to develop and implement data protection policies and procedures, and to ensure that the organization is compliant with data protection laws and regulations. This course can help you become a successful Data Protection Officer by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Network Security Engineer
A Network Security Engineer is a professional who designs, implements, and maintains an organization's computer networks. They work to ensure that the network is secure from cyberattacks and other threats. This course can help you become a successful Network Security Engineer by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Security Consultant
A Security Consultant is a professional who provides advice and guidance to organizations on how to protect their computer systems and networks from cyberattacks and other threats. They work with organizations to identify and assess security risks, and develop and implement security measures to mitigate those risks. This course can help you become a successful Security Consultant by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Incident Responder
An Incident Responder is a professional who works to respond to security incidents. They work to contain and mitigate security breaches, and to restore the organization's computer systems and networks to a secure state. This course can help you become a successful Incident Responder by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Cloud Security Engineer
A Cloud Security Engineer is a professional who works to design and implement security measures for cloud computing environments. They work to ensure that the organization's cloud-based systems and data are secure from cyberattacks and other threats. This course can help you become a successful Cloud Security Engineer by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Penetration Tester
A Penetration Tester is a professional who works to identify and exploit vulnerabilities in an organization's computer systems and networks. They do this by simulating cyberattacks to identify weaknesses in the organization's security posture. This course can help you become a successful Penetration Tester by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Malware Analyst
A Malware Analyst is a professional who works to identify and analyze malware. They work to understand how malware works and how to protect against it. This course can help you become a successful Malware Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Security Architect
A Security Architect is a professional who designs and implements an organization's security architecture. They work to ensure that the organization's computer systems and networks are secure from cyberattacks and other threats. This course can help you become a successful Security Architect by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Threat Intelligence Analyst
A Threat Intelligence Analyst is a professional who works to collect and analyze threat intelligence. They work to identify and assess security threats, and to develop and implement security measures to mitigate those risks. This course can help you become a successful Threat Intelligence Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Forensic Analyst
A Forensic Analyst is a professional who works to investigate cybercrimes. They work to collect and analyze evidence from computer systems and networks to identify the perpetrators of cybercrimes. This course can help you become a successful Forensic Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Cyber Security Analyst
A Cyber Security Analyst is a professional who works to protect an organization's computer systems and networks from cyberattacks. They do this by investigating security breaches, identifying vulnerabilities, and developing and implementing security measures to prevent future attacks. This course can help you become a successful Cyber Security Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.
Security Operations Center Analyst
A Security Operations Center Analyst is a professional who works to monitor and respond to security incidents. They work to identify and mitigate security threats, and to ensure that the organization's computer systems and networks are secure. This course can help you become a successful Security Operations Center Analyst by providing you with a fundamental understanding of system defense, including topics such as attack vectors and threat modeling strategies, security controls, and intrusion prevention techniques.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Fundamentals of Defending Systems.
Provides a practical guide to threat modeling. It would be a valuable resource for students who want to learn how to identify and mitigate security threats.
Provides a practical guide to penetration testing. It would be a valuable resource for students who want to learn how to test the security of their systems.
Provides a high-level overview of cybersecurity for managers and executives. It would be a valuable resource for students who want to learn more about the business side of cybersecurity.
Provides a practical guide to network security. It would be a valuable resource for students who want to learn how to secure their networks.
Provides a comprehensive overview of network security. It would be a valuable resource for students who want to prepare for the Security+ certification.
Provides a comprehensive overview of cybersecurity. It would be a valuable resource for students who want to prepare for the CISSP certification.
Provides a comprehensive guide to building secure software. It would be a valuable resource for students who want to learn how to develop secure code.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser