Certified Cybersecurity Operations Analyst (CCOA)
Cybersecurity analysts are critical to protecting organizations from cyberattacks and safeguarding sensitive information. Professionals who earn the Certified Cybersecurity Operations Analyst (CCOA)™ certification, brought to you by the creators of the globally recognized Certified Information Security Manager® (CISM®), will gain a deep understanding of identifying and responding to cyberthreats and performing vulnerability assessments, as well as industry best cybersecurity practices. Leveraging applicable modern technologies, CCOA learners will develop skills through hands-on training that places them in a lab environment where they will develop techniques they will use on the job.
- Identify the purpose, benefits, and use of APIs.
- Understand the principles and concepts of DevOps, SecDevOps, and the CI/CD pipeline.
- Understand cybersecurity governance and alignment with business drivers.
- Establish effective cross-organizational communication for cybersecurity.
- Define roles and responsibilities for cybersecurity initiatives.
- Explore the threat landscape, including attack vectors and threat actors.
- Utilize threat intelligence sources effectively.
- Identify the components and techniques involved in incident detection, from data analytics to security logs and alerts.
- Gain proficiency in forensic analysis, malware analysis, network traffic analysis, packet analysis, and threat analysis for comprehensive incident response.
- Differentiate between the security needs of various industries based on the unique values assigned to digital assets and risk tolerance levels.
- Understand the principles and practices of identity and access management to ensure proper authorization and authentication.
Cybersecurity professionals with 2-3 years of experience looking to enhance their technical skill set and address cybersecurity challenges more effectively. CCOA is an especially valuable credential for early-career security professionals looking to one day
2-3 years of experience in Cybersecurity
- Networking
- System & Endpoint
- Applications
- Cybersecurity Principles
- Cybersecurity Risk
- Threat Landscape
- Means and Methods
- Incident Detection
- Incident Response
- Controls
- Vulnerability Management