Course Library

Cyber Security Analyst

Cyber Security Analysts are protecting Australia’s critical infrastructure, utilities, banking institutions and most importantly data every single day.

01 - ABOUT THE COURSE

Start a new career in Cyber Security, no IT experience needed!

A cyber security professional is responsible for understanding and implementing both the technical and business requirements for the defensive and offensive protection of their enterprise's computer network. They are experts in detecting and managing threats using specialised monitoring equipment and network tools or for analysing and reporting on network vulnerabilities.

Cyber Security Analysts are highly sought after by government and industry with hundreds of open jobs not being filled each month. The best analysts show high levels of curiosity, logical reasoning and a competitive will to win. Armed with skills developed on our Cyber Security Analyst course, you will be confident and competent to start work immediately upon graduation, with no previous technical experience required. We help you identify what you are good at and give you access to career options you’d never considered before and assist you to reach your potential.

Our Cyber Security Analyst course is recognised under the GCHQ Certified Training program (GCT). This certification recognises that our training course is of an industry-level quality as assessed by the Institute of Information Security Professions (ISP) Skills Framework. Recognition under the GCT scheme provides our students, customers, and partners with the confidence that WithYouWithMe training is consistent with Industry best practice.

02 - COURSE OUTLINE

Course Introduction

10

WYWM Cyber Pathway

5

Introduction to Cyber Security

5

Introduction to the Security Operations Centre (SOC)

5

Tier 1 Analyst Role

5

Incident Response

5
Introduction to Incident Response
5
Introduction to Playbooks
5
A reflective review of your understanding of Incident Response
5
Tech Stack Introduction
5
Techstack Details
5
Firewalls
5
IDPS
5

Understanding Security Information and Event Management Platforms (SIEMs)

5
Security Information and Event Management (SIEM)
5
Event Logs
5
Interpreting Logs
5
Wazuh Overview
5
Wazuh Operations
5
Wazuh Server Installation
5

Begin your transition from Military to a Tech Career

Begin my journey

OUR PARTNERS IN EXPANSION

Just some of the awesome companies that use our services