Learn to protect critical systems & sensitive information from digital attacks

Security Analyst Certificate

Let’s secure your future

About This Course

The Security Analyst certificate program offers you the opportunity to gain
hands-on-training for in-demand skills such as knowing how to identify
and correct flaws in a company’s security systems, solutions, and
programs.

Students who complete this program are well-prepared to pursue the
CySA+ industry certification exam. You will also be able to work with
companies of all sizes, specifically, businesses related to vulnerable
sectors of the economy, such as the military, oil, and gas companies, and
banks.

Career Opportunities

Practicum

None

Training Related Employment Rate

90%

Salaries & Wages

$80,533

LESSON 1 Computing Overview
1. Course Introduction
2. Hardware Basics
3. Windows Basics
4. Linux Basics
5. macOS Basics
6. Practice Exam
7. Exam

LESSON 2 PC Technician Responsibilities
1. Protection and Safety
2. Professionalism
3. Change Management; PC Tools
4. PC Maintenance
5. Troubleshooting Process Overview
6. Practice Exam
7. Exam

LESSON 3 System Components
1. Cases and Form Factors
2. Power Supplies
3. Motherboards and Buses
4. Motherboard Troubleshooting
5. Processors
6. Processor Troubleshooting
7. Memory
8. Memory Installation
9. Memory Troubleshooting
10. BIOS/UEFI
11. Expansion Cards
12. Video; Audio
13. Cooling
14. Practice Exam
15. Exam

LESSON 4 Peripheral Devices
1. Peripheral Devices
2. USB
3. Display Devices
4. Video Troubleshooting
5. Device Driver Management
6. Device Driver Troubleshooting
7. Practice Exam
8. Exam

LESSON 5 Storage
1. Storage Devices
2. SATA
3. Optical Media
4. RAID
5. File Systems
6. File System Creation
7. Storage Management
8. Storage Spaces
9. Disk Optimization
10. Storage Troubleshooting
11. Practice Exam
12. Exam

LESSON 6 Networking
1. Networking Overview;
2. Network Hardware;
3. Networking Media
4. Ethernet; IP Networking
5. IP Configuration
6. IP Version 6
7. Internet Connectivity
8. Network Utilities
9. Network Troubleshooting
10. Practice Exam
11. Exam

LESSON 7 Wireless Networking
1. 802.11 Wireless
2. Infrared, Bluetooth, and NFC
3. SOHO Configuration
4. Internet of Things
5. Wireless Network Troubleshooting
6. Practice Exam
7. Exam

LESSON 8 Printing
1. Printers
2. Printer Configuration
3. Network Printing
4. Printing Management
5. Printer Maintenance
6. Printer Troubleshooting
7. Practice Exam
8. Exam

LESSON 9 Mobile Devices
1. Laptops
2. Laptop Components
3. Laptop Power Management
4. Laptop Troubleshooting
5. Mobile Devices
6. Mobile Device Networking
7. Mobile Device Security
8. Mobile Device Troubleshooting
9. Practice Exam
10. Exam

LESSON 10 System Implementation
1. Component Selection
2. Windows Pre-Installation
3. Windows Installation
4. Post-Installation
5. Virtualization
6. Practice Exam
7. Exam

LESSON 11 File Management
1. Windows File Locations
2. Manage Files on Windows
3. NTFS Permissions
4. Shared Folders
5. Linux File Management
6. Practice Exam
7. Exam

LESSON 12 System Management
1. Windows System Tools
2. Preferences and Settings
3. Performance Monitoring
4. Active Directory
5. Users and Groups
6. Remote Services
7. Windows Application Management
8. Linux Application Management
9. Digital Content Management
10. Updates
11. System Backup
12. System Recovery
13. Virtual Memory
14. Operating System Troubleshooting
15. Windows Boot Errors
16. Practice Exam
17. Exam

LESSON 13 Security
1. Security Best Practices
2. Incident Response
3. Physical Security
4. Social Engineering
5. BIOS/UEFI Security
6. Malware Protection
7. Authentication
8. File Encryption
9. Network Security
10. Firewalls
11. Proxy Servers
12. VPN
13. Security Troubleshooting
14. Practice Exam
15. Exam

LESSON 1 Networking Basics
1. Networking Overview
2. Network Topologies
3. The OSI Model
4. Network Protocols
5. Numbering Systems
6. Practice Exam
7. Exam

LESSON 2 Cables and Connectors
1. Twisted Pair
2. Coaxial
3. Fiber Optic
4. Wiring Implementation
5. Troubleshoot Network Media
6. Practice Exam
7. Exam

LESSON 3 Networking Devices
1. Network Adapters
2. Network Devices
3. Internetwork Devices
4. Practice Exam
5. Exam

LESSON 4 Ethernet
1. Ethernet
2. Ethernet Specifications
3. Connect Network Devices
4. Troubleshoot Physical Connectivity
5. Practice Exam
6. Exam

LESSON 5 IP Configuration
1. IP Addressing
2. APIPA and Alternate Addressing
3. DHCP Server Configuration
4. DHCP Relay
5. DNS Name Resolution
6. IP Version 6
7. Multicast
8. Troubleshoot IP Configuration Issues
9. Troubleshoot IP Communications
10. Troubleshoot Name Resolution
11. Practice Exam
12. Exam

LESSON 6 Switch Management
1. Switch Access
2. Switch IP Configuration
3. Switch Interface Configuration
4. Virtual LANs
5. Trunking
6. Spanning Tree Protocol
7. Switch Troubleshooting
8. Practice Exam
9. Exam

LESSON 7 Routing
1. Routing Basics
2. Routing Protocols
3. Network Address Translation
4. Routing Troubleshooting
5. Practice Exam
6. Exam

LESSON 8 Firewalls
1. Firewalls
2. Security Appliances
3. Firewall Design and Implementation
4. Practice Exam
5. Exam

LESSON 9 Network Customization
1. Network-Based Storage
2. Voice over IP (VoIP)
3. Virtualization
4. Virtual Networking
5. Cloud Computing
6. Practice Exam
7. Exam

LESSON 10 Wireless Networking
1. Wireless Concepts
2. Wireless Standards
3. Wireless Configuration
4. Wireless Network Design
5. Wireless Network Implementation
6. Wireless Security
7. Wireless Troubleshooting
8. Practice Exam
9. Exam

LESSON 11 Wide Area Networks (WANs)
1. WAN Concepts
2. WAN Connections
3. Internet Connectivity
4. Remote Access
5. WAN Troubleshooting
6. Practice Exam
7. Exam

LESSON 12 Network Policies and Procedures
1. Network Design, Documentation, and Policies, Risk Management
2. Security Policies
3. Practice Exam
4. Exam

LESSON 13 Network Security
1. Physical Security
2. Social Engineering;
3. Network Vulnerabilities and Threats 1
4. Network Vulnerabilities and Threats 2, Authentication, Secure Protocols
5. Remote Access Security
6. Troubleshoot Network Security Issues
7. Practice Exam
8. Exam

LESSON 14 Network Hardening
1. Detection and Prevention
2. Penetration Testing
3. Network Hardening
4. Practice Exam
5. Exam

LESSON 15 Network Management
1. Update Management, Data Protection, Remote Management, Mobile Device Management
2. Data Center Management
3. Monitoring
4. Log File Management
5. Network Management with SNMP
6. Practice Exam
7. Exam

LESSON 16 Network Optimization
1. Optimization
2. Troubleshooting Methodology
3. Practice Exam
4. Exam

LESSON 1 Linux Overview
1. Linux Introduction

LESSON 2 Using Linux
1. The Linux Shell
2. Linux Help
3. Text Editors
4. Aliases
5. Environment Variables
6. Shell Configuration Files
7. Redirection, Piping and Command Substitution
8. Directories
9. Files
10. Links
11. Filesystem Hierarchy Standard (FHS)
12. Locating and Searching Files
13. Text Stream Processing
14. Practice Exam

LESSON 3 Installation and Localization
1. Linux System Design
2. Linux Installation
3. Localization
4. Practice Exam

LESSON 4 Boot and Shutdown
1. Linux Boot Process
2. Bootloaders
3. systemd Boot Targets
4. System Services
5. System Shutdown
6. Practice Exam

LESSON 5 Graphical User Interfaces and Desktops
1. Graphical User Interfaces
2. Linux Desktops
3. Remote Desktop
4. Accessibility
5. Practice Exam

LESSON 6 Software Installation
1. Red Hat Package Manager (RPM)
2. Online Package Installation
3. Debian Package Manager (dpkg)
4. Shared Libraries
5. Practice Exam

LESSON 7 Users and Groups
1. User and Group Overview
2. User Management
3. Group Management
4. Practice Exam

LESSON 8 Disk and File System Management
1. MBR Disk Partitions
2. GUID Partitions
3. Logical Volume Manager
4. File Systems
5. Mounting File Systems
6. File System Maintenance
7. Disk Quotas
8. Ownership
9. Permissions
10. The umask Command
11. Special Permissions
12. Archive and Backup
13. Practice Exam

LESSON 9 Hardware Installation
1. Device Drivers
2. Kernel Module Management
3. Hotplug and Coldplug Devices
4. Practice Exam

LESSON 10 Processes and System Services
1. Processes
2. Process Management
3. Task Management
4. Print Management
5. System Time Configuration
6. Practice Exam

LESSON 11 System Monitoring
1. System Logging
2. Resource Monitoring
3. Practice Exam

LESSON 12 Networking
1. IPv4 Overview
2. Network Interface Configuration
3. IPv6 Overview
4. Routing Configuration
5. Hostname and DNS Configuration
6. Linux Firewalls
7. Network Troubleshooting
8. Practice Exam

LESSON 13 Cloud and Virtualization
1. Cloud and Virtualization Overview
2. Virtual Machines
3. Virtual Networking
4. Practice Exam

LESSON 14 Scripting and Automation
1. Bash Shell Scripting
2. Shell Environments, Bash Variables and Parameters
3. Bash Scripting Logic
4. Version Control Using Git
5. Orchestration Processes and Concepts
6. Practice Exam

LESSON 15 Security
1. Root Usage
2. User Security and Restriction
3. Login Blocking
4. Network Security
5. The xinetd Super Daemon
6. OpenSSH
7. SSH Port Tunneling
8. Security-Enhanced Linux (SELinux)
9. Application Armor (AppArmor)
10. Public Key Authentication
11. VPN Access and Authentication
12. Security Best Practices
13. Practice Exam

LESSON 1 Introduction
1. Security Overview
2. Using the Simulator

LESSON 2 Security Basics
1. Understanding Attacks
2. Defense Planning
3. Access Control
4. Cryptography Basic
5. Network Monitoring
6. Incident Response
7. Practice Exam

LESSON 3 Policies, Procedures, and Awareness
1. Security Policies
2. Risk Management
3. Business Continuity
4. Manageable Network Plan
5. Social Engineering
6. App Development and Deployment
7. Employee Management
8. Mobile Devices
9. Third-Party Integration
10. Practice Exam

LESSON 4 Physical
1. Physical Threats
2. Device Protection
3. Network Infrastructure Protection
4. Environmental Controls
5. Practice Exam

LESSON 5 Perimeter
1. Recon and Denial
2. Spoofing and Poisoning
3. Security Appliances
4. Demilitarized Zones (DMZ)
5. Firewalls
6. Network Address Translation (NAT)
7. Virtual Private Networks (VPN)
8. Web Threat Protection
9. Network Access Protection
10. Wireless Overview
11. Wireless Attacks
12. Wireless Defenses
4. Practice Exam

LESSON 6 Network
1. Network Threats
2. Network Device Vulnerabilities
3. Network Applications
4. Switch Attacks
5. Switch Security
6. Using VLANs
7. Router Security
8. Intrusion Detection and Prevention
9. Vulnerability Assessment
10. Protocol Analyzers
11. Remote Access
12. Network Authentication
13. Penetration Testing
14. Virtual Networking
15. Software-Defined Networking (SDN)
16. Cloud Services
17. Practice Exam

LESSON 7 Host
1. Malware
2. Password Attacks
3. Windows System Hardening
4. Hardening Enforcement
5. File Server Security
6. Linux Host Security
7. Embedded Systems
8. Log Management
9. Audits
10. Email
11. BYOD Security
12. Mobile Device Management
13. Host Virtualization
14. Practice Exam

LESSON 8 Application
1. Access Control Models
2. Authentication
3. Authorization
4. Web Application Attacks
5. Internet Browsers
6. Application Development
7. Active Directory Overview
8. Windows Domain Users and Groups
9. Linux Users
10. Linux Groups
11. Linux User Security
12. Group Policy Overview
13. Hardening Authentication 1
14. Hardening Authentication 2
15. Practice Exam

LESSON 9 Data
1. Data Management
2. Advanced Cryptography
3. Cryptography Implementations
4. Cryptographic Attacks
5. Symmetric Encryption
6. Asymmetric Encryption
7. File Encryption
8. Public Key Infrastructure (PKI)
9. Hashing
10. Data Transmission Security
11. Data Loss Prevention (DLP)
12. Redundancy
13. Backup and Restore
14. Cloud Storage
15. Practice Exam

LESSON 1 Introduction
1. Introduction

LESSON 2 Threat Intelligence
1. Penetration Testing Process and Types
2. Threat Hunting
3. Organizational Security
4. Security Controls
5. Practice Exam

LESSON 3 Risk Mitigation
1. Risk Identification Process
2. Risk Calculation
3. Risk Communication and Training
4. Practice Exam

LESSON 4 Social and Physical Security
1. Social Engineering
2. Physical Security
3. Countermeasures and Prevention
4. Practice Exam

LESSON 5 Reconnaissance
1. Reconnaissance Overview
2. Reconnaissance Countermeasures
3. Scanning
4. Practice Exam

LESSON 6 Enumeration
1. Enumeration Overview
2. Enumeration Countermeasures
3. Practice Exam

LESSON 7 Vulnerability Management
1. Vulnerability Assessment
2. Vulnerability Management Life Cycle
3. Vulnerability Scoring Systems
4. Vulnerability Analysis
5. Practice Exam

LESSON 8 Identity and Access Management Security (IAM)
1. Identity and Access Management Security
2. Privilege Escalation
3. Identity and Access Management Threats
4. Certificate Management
5. Practice Exam

LESSON 9 Cybersecurity Threats
1. Malware
2. Combat Malware
3. Sniffing
4. Session Hijacking
5. Denial of Service
6. SQL Injections
7. Practice Exam

LESSON 10 Infrastructure Security
1. Intrusion Detection Systems
2. Firewalls
3. Honeypots and DNS Sinkholes
4. Web Servers
5. Network Access
6. Web Applications
7. Specialized Technology
8. Practice Exam

LESSON 11 Wireless and IOT Security
1. Wireless Security
2. Bluetooth Security
3. Mobile Device Security
4. Cloud Security
5. Internet of Things Security
6. Cloud Security Standards
7. Conclusion
8. Practice Exam

LESSON 12 Infrastructure Analysis
1. Hardware Analysis
2. Security Information and Event Management (SIEM)
3. Log Review
4. Asset Management
5. Supply Chain Management
6. Change Management
7. Virtualization Management
8. Practice Exam

LESSON 12 Infrastructure Analysis
1. Hardware Analysis
2. Security Information and Event Management (SIEM)
3. Log Review
4. Asset Management
5. Supply Chain Management
6. Change Management
7. Virtualization Management
8. Practice Exam

LESSON 13 Software Assurance
1. Software Development Overview
2. Automation
3. Practice Exam

LESSON 14 Data Analysis
1. Data Analysis and Protection
2. Hashing
3. Digital Forensics
4. Email Analysis
5. Practice Exam

LESSON 15 Incident Response
1. Incident Response – Preparation
2. Incident Response – Detection and Containment
3. Incident Response – Eradication and Recovery
4. Indicators of Compromise
5. Practice Exam

LESSON 1 Introduction to Ethical Hacking
1. Introduction

LESSON 2 Introduction to Penetration Testing
1. Penetration Testing Process and Types
2. Threat Actors
3. Target Selection
4. Assessment Types
5. Legal and Ethical Compliance
6. Practice Exam

LESSON 3 Social Engineering and Physical Security
1. Social Engineering
2. Physical Security
3. Countermeasures and Prevention
4. Practice Exam

LESSON 4 Reconnaissance
1. Reconnaissance Overview
2. Reconnaissance Countermeasures
3. Practice Exam

LESSON 5 Scanning
1. Scanning Overview
2. Banner Grabbing
3. Practice Exam

LESSON 6 Enumeration
1. Enumeration Overview
2. Enumeration Countermeasures
3. Practice Exam

LESSON 7 Analyze Vulnerabilities
1. Vulnerability Assessment
2. Vulnerability Management Life Cycle
3. Vulnerability Scoring Systems
4. Vulnerability Assessment Tools

LESSON 8 System Hacking
1. System Hacking
2. Privilege Escalation
3. Maintain Access
4. Cover Your Tracks
5. Practice Exam

LESSON 9 Malware
1. Malware
2. Combat Malware
3. Practice Exam

LESSON 10 Sniffers, Session Hijacking, and Denial of Service
1. Sniffing
2. Session Hijacking
3. Denial of Service
4. Practice Exam

LESSON 11 IDS, Firewalls, and Honeypots
1. Intrusion Detection Systems
2. Firewalls
3. Honeypots
4. Practice Exam

LESSON 12 Web Servers, Web Applications, and SQL Injections
1. Web Servers
2. Web Applications
3. SQL Injections
4. Practice Exam

LESSON 13 Wi-Fi, Bluetooth, and Mobile Devices
1. Wi-Fi
2. Bluetooth Hacking
3. Mobile Devices
4. Practice Exam

LESSON 14 Cloud Computing and Internet of Things
1. Cloud Computing
2. Internet of Things
3. Practice Exam

LESSON 15 Cryptography
1. Cryptography
2. Public Key Infrastructure
3. Cryptography Implementations
4. Cryptanalysis and Cryptographic Attack Countermeasures
5. Practice Exam

The effective workplace skills are one of the greatest assets for new graduates or people who decided to change their career path. The technical knowledge and skills obtained throughout this course is important for future employment, but the ability to transition the knowledge into a new working environment is invaluable.

Within this portion of the Cyber Security , our Career Services Team will facilitate the workshops that will prepare for successful participation in the job search and help students to increase confidence in communications with potential employers, succeed in marketing their skill set and land the job. Through scheduled individual and group sessions with Career Services students will have an opportunity to share their job-seeking experiences with their peers and gain valuable insights from others. Our Employment Specialists will be accessible to provide continuous support and guidance towards achieving short and long-term employment goals.

Our Career Services Team will consist of seasoned Career Practitioners who will help with the following tasks during the course:

  • Build professional branding from creating a dynamic resume to stand-out LinkedIn profile and
    powerful cover letters, as well as writing professional thank-you notes
  • Develop strategies in job search to obtain an interview
  • Educate about interview process
  • Advise on negotiating offers of employment

LESSON 1
1. Labor Market Information
2. Employers’ expectations
3. Self-marketing
4. Hard and Soft Skills

LESSON 2
1. Resume writing
2. Resume formats
3. Resume as a Marketing Tool
4. Applicant Tracking Systems

LESSON 3
1. Organizing and Conducting Your Job Search
2. The Hidden Job Market; Research

LESSON 4
1. Effective Communication Skills
2. Employment Letter
3. Elevator Pitch
4. Job Interview Types
5. Preparation for Job interview

LESSON 5
1. Job Interview Practice
2. Elevator Pitch Practice
3. Resume Review
4. Career Management
5. Job Overview
6. Q&A

The Curriculum

Start Date

First Monday of each Month

Duration

24 Weeks

Program Delivery

Any-time Online
Blended
Real-Time Online

For a Better Future

Why Alberta Educational Centre?

Play Video

Any questions?

Give our team of admissions advisors a call and we will answer all your questions and concerns