Analyze Various Data Sources to Confirm Suspected Infection
CompTIA Linux+
CompTIA Linux+ LX0-103
CompTIA LX0-103: Linux+
CompTIA Linux+ LX0-104
Scanning and Mapping Networks
Firewall Set-up and Configuration
Setting up Zones in a Firewall
Block Incoming Traffic Known Port
Network Miner
CompTIA Network+
CompTIA Network+ N10-007
CompTIA - N10-007 Network+
Preliminary Scanning
Open Systems Interconnection model (OSI model)
TCP/IP
Network Devices
Comparing Controls
Cisco CCNA
Cisco Certified Network Associate (CCNA 200-125)
Intro to InfoSec
CompTIA Security+
CompTIA Security+ 501
CompTIA SY0-501: Security+
Penetration Testing and Ethical Hacking
Certified Ethical Hacker (CEH)
Ethical Hacking (CEH Preparation)
Open Source Password Cracking
Intro to Malware Analysis and Reverse Engineering
Participate in Attack Analysis Using Trusted Tool Set
Cross Site Request Forgery (CSRF)
Cross Site Request Forgery (CSRF) Defend
Web Application Penetration Testing
XSS Store Based Fishing
XSS Stored
XSS Reflected
Incident Response and Advanced Forensics
Botnet Takedown
Network Discovery
Parse Files Out of Network Traffic
Specialized Linux Port Scans
Using Snort and Wireshark to Analyze Traffic
Threat Designation
Fundamental Vulnerability Management
Applying Filters to TCPDump and Wireshark
Security Assessment & Testing
Identifying System Vulnerabilities with OpenVAS
Implement Single System Changes in Firewall
Manual Vulnerability Assessment
Performing an Initial Attack Analysis
Advanced Techniques for Malware Recovery
Analyze and Classify Malware
Dynamic Malware Analysis Capstone
CompTIA Cybersecurity Analyst (CySA+)
CompTIA CySA+
Vulnerability Scanner Set-up and Configuration
Vulnerability Scanner Set-up and Configuration, Pt. 2
Monitoring Network Traffic
Analyze SQL Injection Attack
Creating Recommendations Based on Vulnerability Assessments
Advanced Penetration Testing
Denial of Service PCAP Analysis
Centralized Monitoring
Computer and Hacking Forensics
Metasploit
On-the-job training
General Practices - Foundations
Demonstrate a working understanding of the organization's structure, personnel rules, responsibilities, and general understanding of work ethics, interpersonal communications, and related policies. Understands and practices safety procedures and rules.
Demonstrate a working understanding of the organization's goals, mission, and vision.
Demonstrate a working understanding of the organization's office tools such as copiers, fax machines, etc.
Demonstrate a working knowledge of the components of a computer and perform basic troubleshooting on communication issues within a computer
Demonstrate a working knowledge of the hardware components of a computer and perform basic troubleshooting on hardware related issues.
General Practices - Computer Basics
Demonstrate a working knowledge of the Microsoft Office suite and basic troubleshooting on a computer.
Demonstrate a basic knowledge of troubleshooting, networking, and security across a variety of devices.
Demonstrate a basic knowledge of the cloud components of a network and perform basic troubleshooting on hardware related issues.
Demonstrate a basic knowledge of "best practices" in general network security
General Practices - Security Basics
Demonstrate a basic knowledge of "best practices" in managing Linux networks.
Demonstrate a fundamental knowledge of "best practices" in general network security
General Practices - Advanced Networking
Demonstrate a fundamental knowledge of basic networking, to allow the flow of information between multiple computers. Install and configure client operating systems for the organization
Demonstrate a working knowledge of how to configure and troubleshoot network operating systems
Demonstrate a working knowledge of how to configure and troubleshoot Active Directory
Demonstrate a working knowledge of how to configure and troubleshoot identity and access solutions
General Practices - Advanced Networking Cont.
Demonstrate a working knowledge of how to configure and troubleshoot IIS and terminal services
Plan and administer Windows Server 2008R2 or newer
Design a Windows Server 2008R2 or newer Network Infrastructure
Design a Windows Server 2008R2 or newer Active Directory Infrastructure
General Practices - Advanced Security
Demonstrate a basic knowledge of best practices in cryptography, end user management, penetration testing, data forensics, malware, NIST standards, metas-loot, end-user management, threat responses, social engineering, and corporate security management be
Interested in this apprenticeship?
Sign up to receive notifications about changes and updates about Cybersecurity Analyst.