competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
Cybersecurity Analyst
USDOL
Work Process Content
On the Job Training
Basic Hardware
3
- Demonstrate knowledge of various mobile device types, their features, and purpose.
- Demonstrate knowledge of common computer hardware and interfaces.
- Demonstrate skills required to troubleshoot general computer hardware issues.
Linux Operating System Fundamentals
5
- Demonstrate basic command-line knowledge in Linux.
- Demonstrate the skills required to install and configure a Linux-based computer.
- Demonstrate knowledge of basic networking configuration.
- Demonstrate ability to perform basic administrative tasks in Linux.
- Demonstrate basic scripting skills in Linux.
Basic Networking
2
- Demonstrate knowledge of basic networking concepts (wired and wireless).
- Demonstrate skills required to configure and troubleshoot device connectivity (LAN and Internet Access).
Cloud Virtualization Technologies
2
- Demonstrate knowledge of cloud computing concepts, including cloud storage and security configurations
- Demonstrate skills required to configure client-side virtualization and cloud storage applications.
Operating System Basics
5
- Demonstrate knowledge of important Microsoft Windows 10 operating system features and their purposes.
- Demonstrate skills required to install, configure, and secure Microsoft Windows 10 operating system versions.
- Demonstrate skills required to troubleshoot Microsoft Windows operating system problems.
- Demonstrate knowledge of important Mac OS and Linux OS desktop operating system features and their purpose.
- Demonstrate skills required to configure, secure, and troubleshoot various operating systems Mac OS and Linux OS.
IT Security Basics
4
- Demonstrate knowledge of basic enterprise security concepts and wireless security protocols.
- Demonstrate skills required to perform account management, configure wireless security, and detect and remove malware on workstations and mobile devices.
- Demonstrate skills to troubleshoot common computer security issues.
- Demonstrate skills required to troubleshoot application security issues.
General IT Operations
4
- Demonstrate knowledge documentation procedures.
- Demonstrate knowledge of disaster recovery concepts and backup procedures.
- Demonstrate knowledge of licensing and privacy and policy concepts, including how to address prohibited content.
- Demonstrate knowledge of scripting languages, basic functions, and logic structures.
Network Fundamentals
7
- Demonstrate knowledge of the OSI model and relevant encapsulation concepts.
- Demonstrate knowledge of network topologies and network types.
- Demonstrate knowledge of cables, types of connectors, and the purpose for each.
- Demonstrate skills required to configure a subnet and use appropriate IP addressing schemes.
- Demonstrate knowledge of ports, protocols, and services, as well as their purpose.
- Demonstrate knowledge of basic architecture concepts related to corporate and datacenter network environments.
- Demonstrate knowledge of cloud concepts and connectivity alternatives.
Network Implementation
4
- Demonstrate knowledge of network devices, their features, and placement within a network.
- Demonstrate knowledge of routing technologies and concepts for bandwidth management.
- Demonstrate skills required to configure and deploy Ethernet switching solutions, including VLANs.
- Demonstrate skills required to deploy wireless standards configurations and technologies.
Network Security
4
- Demonstrate knowledge of network security concepts.
- Demonstrate knowledge of types of network attacks.
- Demonstrate skills required to implement network hardening techniques.
- Demonstrate knowledge of remote access techniques and related security risks.
Network Troubleshooting
4
- Demonstrate skills and best practices required to troubleshoot networking issues.
- Demonstrate skills required to troubleshoot cable connectivity issues.
- Demonstrate skills required to use network software tools and commands.
- Demonstrate skills required to troubleshoot wireless connectivity issues.
Threats, Attacks, and Vulnerabilities
6
- Demonstrate knowledge of types of social engineering methods.
- Demonstrate skills required to analyze potential signs to determine the type of attack.
- Demonstrate skills required to analyze potential signs related to application attacks, including network-based attacks.
- Demonstrate knowledge of threat actors, vectors, and intelligence sources.
- Demonstrate knowledge of security concerns related to several types of vulnerabilities.
- Demonstrate knowledge of methods used to assess organizational security, including compliance and security assessments and penetration tests.
Architecture and Design
7
- Demonstrate knowledge of foundational security concepts.
- Demonstrate knowledge of virtualization and cloud computing concepts.
- Demonstrate knowledge of concepts related to authentication and authorization design.
- Demonstrate skills required to deploy cybersecurity resilience.
- Demonstrate knowledge of security risks related to embedded and specialized systems.
- Demonstrate knowledge of physical security methods.
- Demonstrate knowledge of cryptographic concepts.
Implementation
5
- Demonstrate skills required to deploy host and application security solutions.
- Demonstrate skills required to deploy secure network designs.
- Demonstrate skills required to apply configurations for wireless security.
- Demonstrate skills required to deploy cybersecurity solutions in a cloud environment.
- Demonstrate skills required to implement identity and account management controls, including public key infrastructure.
Operations and Incident Response
4
- Demonstrate knowledge of incident response policies, processes, and procedures.
- Demonstrate skills required to leverage data sources in support of an investigation.
- Demonstrate skills required to implement mitigation techniques or controls to secure an environment.
- Demonstrate knowledge of important aspects related to digital forensics.
Governance, Risk and Compliance
3
- Demonstrate knowledge of relevant regulations, standards, or frameworks that impact the security posture of an organization.
- Demonstrate knowledge of risk management processes and concepts.
- Demonstrate knowledge of privacy and sensitive data concepts as they relate to security.
Business Acumen
2
- Demonstrate a basic understanding of the employer’s corporate structure and business model, including its product and services portfolio, its primary customers, and its top competitors.
- Demonstrate a basic knowledge of the employer’s brand messaging, its value proposition in the marketplace, and key success metrics.
Employability Skills
12
- Demonstrate skills to provide competent customer service using active listening and empathy during various interactions (e.g., in-person, over telephone, email, and chat).
- Demonstrate ability to manage stress and other emotions in the workplace to reduce conflict, foster collaboration, and promote wellness.
- Demonstrate skills required to take and give productive critical feedback.
- Demonstrate skills required to problem-solve using critical thinking, clarifying questions, and knowing when to escalate a situation to a superior.
- Demonstrate skills to explain complex issues to non- technical customers without jargon or blaming.
- Demonstrate ability to conduct oneself with integrity, professionalism, and in accordance with organization policy and procedure.
- Demonstrate skills to communicate with colleagues, managers, and end users effectively and clearly, in a timely manner.
- Demonstrate ability to use language, tone of voice, and non-verbal communication to neutralize conflict in the workplace.
- Demonstrate skills required to collaborate effectively with team members from across the organization.
- Demonstrate ability to use respectful cross-cultural communication to work successfully across the organization and with diverse coworkers.
- Demonstrate knowledge required to manage time effectively, minimizing distractions to maintain productivity, prioritize work appropriately, and meet deadlines with situational awareness.
- Demonstrate ability to adapt to changing organizational landscape.
Related Instruction Content
Training Provider(s):
Employability Skills
55
● Telling your story ● Managing conflict ● Being an effective team member ● Business communication etiquette ● Interpersonal communication ● Intercultural communication ● Critical thinking ● Time management ● Workplace wellness and managing stress ● Handling workplace change ● Understanding diversity, equity, and inclusion fundamentals
Technical and Professional Skills - Virtualization and Cloud Computing
11
● What is Virtualization? ● Virtualized Server Technology ● Virtual Machines ● Supervisor vs. Hypervisor ● Hypervisor tools ● Client-Side Virtualization ● Server-Side Virtualization ● Benefits of Virtualization
Technical and Professional Skills - Cisco Linux Essentials
44
· Introduction to Linux · OPerating Systems · Working in Linux · Open Source Software and Licensing · Command Line Skills · Navigating the Filesystem · Managing Files and Directories · Archiving and Compression · Working with Text · Basic Scripting · Understanding Computer Hardware · Where Data is Stored · Network Configuration · System and User Security · Creating Users and Groups · Ownership and Permissions · Special Directories and Files
Technical and Professional Skills - Cisco Network Essentials
44
● Networks in our Daily Lives ● Communicating on Local Area Networks ● Network Addressing ● Providing Network Services ● Building a Home Network ● Network Security ● Configuring Cisco Devices ● Testing and Troubleshooting
Technical and Professional Skills - Next Generation Firewall
22
● Introduction to Next Generation Firewalls ● Configuring Firewall Rules ● Configuring and Managing Proxy Server and Web Guard ● Network Anti-Virus ● Network IntrusionDetection and Prevention Systems
Technical and Professional Skills - Cisco Cybersecurity Essentials
33
● Introduction to Cybersecurity ● Cybersecurity Threats, Vulnerabilities, and Attacks ● The Art of Protecting Secrets ● The Art of Ensuring Integrity ● The Five Nines Concept ● Protecting a Cyber Security Domain ● Becoming a Cyber Security Specialist
Technical and Professional Skills - Technical and Professional Skills - CompTIA CYSA+ Coursework and Certification
130
● Threat and Vulnerability Management ● Software and Systems Security ● Security Operations and Monitoring ● Incident Response ● Compliance and Assessment ● Course review and Pass CYSA+ Certification Exam
Technical and Professional Skills - Windows Server Administration
22
· Intro to Windows Server · Managing Users and Groups · Working with Group Policy Objects · Managing Permissions (ACLs) · Windows Hardening
Technical and Professional Skills - Packet and Protocol Analysis
17
● Intro to Network Sniffing ● Using Wireshark for Network Analysis ● Identifying Indicators of Compromise ● Developing Cyber Incident Reports
Technical and Professional Skills - Project-Based Delivery
22
● Project-Based Delivery and its Place in the Economy ● Benefits and Drawbacks of Working on Projects ● Skills to be Leveraged in Project-Based Delivery ● Delivery Platforms Comparison Based on Field of Interest ● Navigating the Lifecycle of Project Sign Up