The student has completed the following learning path and shows an understanding and skills in the following:
Incident Analysis/Response (SOC Analyst Level 1)
- Cyber Threat Response
- Threat Hunting
- SIEM
- ELK stack
- Risk Assessment
- Firewall Security, Network Security, Wireless Security
- Kali Linux
- Python
- OWASP Top 10
- Cloud Architecture
Cloud Security
- Cloud Architecture
- Threats, Attack, and Vulnerabilities
- AWS Infrastructure
- Identity and Access Management
- Cryptography
- Networking
- Risk Management
IT Security Audit
- Logical Security
- IT Audit Controls
- Networking Essentials
- Application control
- End user computing
- Cloud Computing
- Identity and Access Management
- Cryptography
Penetration/Vulnerability Testing
- Networking
- Web Application
- OWASP Top 10
- Web Attacks, System Attack, Network Attack
- Security Analyst
- Vulnerability Assessment
- Command Line Scripting
Threat Intelligence
- Cyber Attacks
- Network Defensive Tactics
- SIEM
- Threat Management
- Vulnerability Scanning
- Threat Intelligence reporting
- Malware Analysis
- Forensics and investigation
Network Security
- Secure Network Architecture
- Vulnerability Testing
- Threat Modeling
- Virtualization Technologies
- Firewalls
- Encryption Solutions
- Secure Coding Practices
Web Application Testing
- Information Security
- Computer Networks and Protocols
- Web Application
- Penetration Testing
- Vulnerability Assessment
- Command Line Scripting
- Creating Documentation
- Preparing Software Tests
- Understanding Testing Processes
- Composing Defect Reports
- Following Sign-Off Procedures
- Analytical and Logical Reasoning
- Business Mapping