Certified Cybersecurity Operations Analyst (CCOA)

Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.
Course Details

Price:

Days:

5

Location:

Course Overview

Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.

Identify the purpose, benefits, and use of APIs. Understand the principles and concepts of DevOps, SecDevOps, and the CI/CD pipeline. Understand cybersecurity governance and alignment with business drivers. Establish effective cross-organizational communication for cybersecurity. Define roles and responsibilities for cybersecurity initiatives. Explore the threat landscape, including attack vectors and threat actors. Utilize threat intelligence sources effectively. Identify the components and techniques involved in incident detection, from data analytics to security logs and alerts. Gain proficiency in forensic analysis, malware analysis, network traffic analysis, packet analysis, and threat analysis for comprehensive incident response. Differentiate between the security needs of various industries based on the unique values assigned to digital assets and risk tolerance levels. Understand the principles and practices of identity and access management to ensure proper authorization and authentication.

2-3 years of experience in Cybersecurity

Domain 1: Technology Essentials

  • Networking
  • System & Endpoint
  • Applications

Domain 2: Cybersecurity Principles and Risk

  • Cybersecurity Principles
  • Cybersecurity Risk

Domain 3: Adversarial Tactics, Techniques, and Procedures

  • Threat Landscape
  • Means and Methods

Domain 4: Incident Detection and Response

  • Incident Detection
  • Incident Response

Domain 5: Securing Assets

  • Controls
  • Vulnerability Management
Class Dates & Times
Filters Sort results
Reset Apply
No results found. Clear filters and try again?
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.