top of page
To Top

The Analyst Course

Dive into the Analyst Course at Cyber Dojo, an innovative program at the intersection of blue and red teaming in cybersecurity. Uncover the intricacies of SIEM, vulnerability patching, and security breach detection. This holistic course offers a unique blend of defensive and offensive strategies, empowering you with versatile skills to thrive in the dynamic field of cybersecurity.

Badge - Certified Cybersecurity Analyst Course

4.0 Rating

16(1).png
  • Proactive Monitoring

  • Data Analytics

  • Gap Analysis

  • Red Vs Blue Testing

  • System Improvements

  • Collaborative Security

  • Security Roadmap & Strategizing

  • User Awareness & Training

Master the Art of Collaborative Defense and Offense with our Purple Teaming Course.

 

Analyst Avatar

Course Details

Total Course Duration                    120 Hours

Course Lab Hours                            60 Hours

Course Modules                               4 Modules

Total Course Topics                         16+ Topics

Internship (1 Month) & Project Support

Additional Technical Soft Skills Module

On Premise Labs Delivery

Access To Specially Curated Study Notes

Course Topics (Macro Scale)

Module 1

1. Fundamentals of Purple Teaming​

2. Introduction to SOC

3. Roles in a SOC

4. Components to Build a SOC

Module 2

1. Understanding Phishing Analysis

2. Exploring Threat Intelligence

3. Introduction to Digital Forensics

4. SIEM Basics

5. Incident Response

6. Network Analysis

Module 3

1. Introduction to Threat Hunting

2. Advanced SIEM Concepts

3. Understanding Vulnerability Management

Module 4

1.Effective Technical Communication

2. Technical Documentation

3. Technical Reporting & Presentations

4. Drafting Technical Proposals 

Untitled design (7).png

Blending Defensive Strategies with Offensive Tactics for a Comprehensive Cybersecurity Skill Set

Tailored for cybersecurity enthusiasts inclined towards collaborative defense, the Purple Teaming course is crafted to elevate careers in defensive security within the dynamic cybersecurity and cyber-defense industry.

bottom of page