competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
Cybersecurity Analyst
Anonymous
Work Process Content
On the Job Training
Period 1
9
- Demonstrate a working understanding of the organization’s structure, personnel rules, responsibilities, and general understanding of work ethics, interpersonal communications, and related policies. Understands and practices safety procedures and rules.
- Demonstrate a working understanding of the organization’s goals, mission, and vision.
- Demonstrate a working understanding of the organization’s office tools such as copiers, fax machines, etc.
- Demonstrate a working knowledge of the components of a computer and perform basic troubleshooting on communication issues within a computer. Example of On-the-Job Duties: Identify the components of standard desktop personal computers. Install and configure computer components. Maintain and troubleshoot peripheral components. Install and configure operating systems.
- Demonstrate a working knowledge of the hardware components of a computer and perform basic troubleshooting on hardware related issues. Example of On-the-Job Duties: Install and configure system components. Troubleshoot system components.
- Demonstrate a working knowledge of the Microsoft Office suite and basic troubleshooting on a computer. Example of On-the-Job Duties: Identify the components of standard desktop personal computers. Install and configure computer components. Maintain and troubleshoot peripheral components. Install and configure operating systems.
- Demonstrate a basic knowledge of troubleshooting, networking, and security across a variety of devices. Example of On-the-Job Duties: Install and configure system components. Troubleshoot system components.
- Demonstrate a basic knowledge of the cloud components of a network and perform basic troubleshooting on hardware related issues. Example of On-the-Job Duties: Manage, maintain, troubleshoot, install, operate, and configure basic cloud infrastructure or services.
- Demonstrate a basic knowledge of “best practices” in general network security. Example of On-the-Job Duties: Implement secured network communications. Designate how to manage public key infrastructure and certificates.
Period 2
6
- Demonstrate a basic knowledge of “best practices” in managing Linux networks. Example of On-the-Job Duties: Implement Linux operating systems to troubleshoot and identify potential cybersecurity risks and breaches.
- Demonstrate a fundamental knowledge of “best practices” in general network security. Example of On-the-Job Duties: Establish security best practices for creating and running web-based applications. Set a policy to enforce organizational security policies. Design systems for monitoring the security infrastructure and manage security incidents.
- Demonstrate a fundamental knowledge of basic networking, to allow the flow of information between multiple computers. Install and configure client operating systems for the organization. Example of On-the-Job Duties: Manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.
- Demonstrate a working knowledge of how to configure and troubleshoot network operating systems. Example of On-the-Job Duties: Install and configure servers. Configure and troubleshoot Domain Name System (DNS) and Windows Internet Name Service (WINS). Configure and troubleshoot DHCP. Configure and troubleshoot IPv4 & IPv6 TCP/IP. Configure and troubleshoot Routing and Remote Access. Install, configure, and troubleshoot the Network Policy Server Role service.
- Demonstrate a working knowledge of how to configure and troubleshoot Active Directory. Example of On-the-Job Duties: Configure Active Directory Domain Services. Perform backup and restore, and monitor and troubleshoot Active Directory related issues.
- Demonstrate a working knowledge of how to configure and troubleshoot identity and access solutions. Example of On-the-Job Duties: Configure, identity, and access solutions with Windows Server 2008 or newer Active Directory. Describe identity and access solutions. Configure Active Directory Certificate Services. Deploy and manage certificates.
Period 3
4
- Demonstrate a working knowledge of how to configure and troubleshoot IIS and terminal services. Example of On-the-Job Duties: Describe the IIS 7.0 or newer modular architecture and workloads. Describe the three methods for installing IIS 7.0 or newer and Install IIS 7.0 or newer using each of the three identified methods. Example of On-the-Job Duties: Install and configure the Terminal Services (TS) role, TS settings, and TS Licensing Role. Identify when to use the per-user and per-device licensing modes, and identify the appropriate licensing scope and configure forest, domain, and workgroup licensing. Configure TS connection properties using TS console and Group Policy. Troubleshoot TS connection properties for a single user and multiple users. Identify the considerations for the types of applications that can be installed in a TS environment.
- Plan and administer Windows Server 2008R2 or newer. Example of On-the-Job Duties: Plan for both Windows Server installation and upgrades. Plan and implement network connectivity by using IPv4-related technologies and plan a migration strategy to IPv6. Plan the deployment of Active Directory related services.
- Design a Windows Server 2008R2 or newer Network Infrastructure. Example of On-the-Job Duties: Describe key components of network infrastructure design. Describe how to design a secure network. Design a plan for allocating IP addresses to workstations and servers. Design an appropriate name resolution system that incorporates DNS. Optimize a name resolution system that incorporates DNS and WINS. Design a solution for network access using Network Access Protection (NAP) solution.
- Design a Windows Server 2008R2 or newer Active Directory Infrastructure. Example of On-the-Job Duties: Design an Active Directory infrastructure and services in Windows Server.
Period 4
1
- Demonstrate a basic knowledge of best practices in cryptography, end user management, penetration testing, data forensics, malware, NIST standards, metasploit, end-user management, threat responses, social engineering, and corporate security management best practices. Example of On-the-Job Duties: Identify and troubleshoot potential risks to files and network. Address and respond to malware issues. Identify phishing or spam emails. Monitor security software.
Related Instruction Content
Training Provider(s):
Analyze Various Data Sources to Confirm Suspected Infection
1
Learning Outcome: Apprentices will be proficient with being able to confirm the presence of malicious activity using the various tools including wireshark and VIrusTotal.com.
CompTIA Linux+
14
Learning Outcome: Apprentices will have a training that will prepare them with the knowledge to become a certified Linux+ expert, spanning a curriculum that covers Linux maintenance task, user assistance and installation and configuration.
CompTIA Linux+ LX0-103
32
Learning Outcome: Apprentices will be proficient at Linux administration and also prepared to take their CompTIA LX0-103 Linux+ certification exam.
CompTIA LX0-103: Linux+
22
Learning Outcome: The practice certification test will prepare apprentices to confidently ace part 1 of the Linux+ certification exam.
CompTIA Linux+ LX0-104
32
Learning Outcome: Apprentices will have knowledge on basic Linux concepts such as package management, commands, and devices.
Scanning and Mapping Networks
3
Learning Outcome: Apprentices will be able to scan and map any network using Zenmap, be able to compare the current network system baseline to the previously recorded network map and annotate any discrepancies, and create and save two documents (.xml and .nmap) detailing the findings concerning each system on the network.
Firewall Set-up and Configuration
3
Learning Outcome: The candidate has demonstrated the ability to set-up a firewall from the command line interface, configure a firewall from a web interface, and learn how to create a firewall rule to manage network traffic at different levels.
Setting up Zones in a Firewall
2
Learning Outcome: Apprentices will be able to be able to configure a pfSense firewall to create/isolate various network segments.
Block Incoming Traffic on Known Port
1
Learning Outcome: Apprentices will be able to respond to an incident by blocking incoming traffic of a known port from a specific IP.
Network Miner
1
Learning Outcome: Apprentices will be able to use the Network Miner tool, analyze pcap files and extract potentially malicious files.
CompTIA Network+
40
Learning Outcome: Apprentices will have the tools to have a successful career in network administration.
CompTIA Network+ N10-007
36
Learning Outcome: Apprentices will have hands on labs to learn VPN Technologies and Services.
CompTIA - N10-007 Network+
4
Learning Outcome: Upon completion of the test apprentices will have a good understanding of network infrastructure, networking concepts, vulnerabilities, network operations, and troubleshooting.
Preliminary Scanning
1
Learning Outcome: Apprentice will know how to utilize Nmap, to identify the systems on a network of responsibilities.
Open Systems Interconnection model (OSI model)
1
Learning Outcome: Apprentices will be able to operate the OSI model and be prepared to obtain their OSI model certification.
TCP/IP
1
Learning Outcome: Apprentices will have the knowledge of core networking principles that are essential for advancing a career in cyber security or information assurance.
Network Devices
3
Learning Outcome: Network devices will solidify apprentice’s knowledge in networking and allow them the opportunity to work hands on with a variety of essential equipment, furthering their cyber security career and provide a valuable skill set that will always be in demand.
Comparing Controls
1
Learning Outcome: Apprentices will know how to evaluate policies in place on a domain and apply the policies in accordance to organizational standards.
Cisco CCNA
20
Learning Outcome: Apprentices will become proficient in operating, installing, configuring, and troubleshooting WAN, LAN, and dial access services for medium-sized networks.
Cisco Certified Network Associate (CCNA 200-125)
35
Learning Outcome: Apprentices will have the skills and knowledge they need to successfully complete their 200-152 Cisco Certified Network Associate certification exam.
Intro to InfoSec
1
Learning Outcome: Apprentices will be ready to launch a new career.
CompTIA Security+
10
Learning Outcome: Apprentices will be properly prepared to successfully complete the CompTIA Security+ certification exam.
CompTIA Security+ 501
30
Learning Outcome: Apprentice will know the information to confidently ace the CompTIA Security+ certification exam.
CompTIA SY0-501: Security+
2
Learning Outcome: Based upon a passing score, this test will prove that apprentices have the knowledge threats, attacks and vulnerabilities, technologies and tools, architecture and design. Identity and access management, risk management, cryptography and PKI.
Penetration Testing and Ethical Hacking
14
Learning Outcome: Apprentices will be able to exploit networks in the manner of an attacker and be able to protect the network from the attacker.
Certified Ethical Hacker (CEH)
25
Learning Outcome: Apprentice will have the skills to become a skillful capable ethical hacker and be able to confidently ace their Certified Ethical Hacker certification exam.
Ethical Hacking (CEH Preparation)
4
Learning Outcome: Based upon a passing score, apprentices will have the knowledge of mapping networks, packet sniffing, social engineering and planting a backdoor.
Open Source Password Cracking
7
Learning Outcome: Open Source Password Cracking lab teaches apprentices how to use the open source tool, John the Ripper, to crack passwords of various file types on both a Windows and a Linux virtual machine. Apprentices will learn about using tools to crack passwords on Windows and Linux machines. There are many methods to crack passwords, this skill is a key part of the Cyber Operator work role and builds to the ability to use tools, techniques, and procedures to remotely exploit and establish persistence on a target.
Intro to Malware Analysis and Reverse Engineering
10
Learning Outcome: Apprentices will be able to perform dynamic and static analysis on all major file types. Apprentices will know how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.
Participate in Attack Analysis Using Trusted Tool Set
3
Learning Outcome: Apprentices will be able to participate in the attack analysis and incident response to identify vulnerabilities. Apprentices will also be able to capture a list of the current environmental variables that later will be analyzed for any anomalies in the variables.
Cross Site Request Forgery (CSRF)
1
Learning Outcome: Apprentices will be able to prevent ill-intent such as “Phishing” scams, downloadable files via a link, etc. that directs an end-user to a falsified server.
Cross Site Request Forgery (CSRF) Defend
1
Learning Outcome: Apprentices will be able to defend against Cross-Site Request Forgery attacks.
Web Application Penetration Testing
3
Learning Outcome: Apprentices will be able to develop their own pen testing environment.
XSS Store Based Fishing
1
Learning Outcome: Apprentices will be able to perform the following duties: secure coding, web application security essentials, OWASP top 10-cross site scripting, and gain administrator access to illegal websites.
XSS Stored
1
Learning Outcome: Apprentices will be able to perform a Stored XSS attack in their investigation of a website that is being used for illegal content.
XSS Reflected
1
Learning Outcome: Apprentices will be able to identify XSS Reflected vulnerabilities, how to find XSS Reflected vulnerabilities, how to create a malicious link that will be used for XSS Reflected attack, and they will be able to insert the link into the website.
Incident Response and Advanced Forensics
5
Learning Outcome: Apprentices will be able to integrate advanced authentication, how to manage risk in enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.
Botnet Takedown
3
Learning Outcome: Apprentices will have a proper knowledge to be able to disable a botnet.
Network Discovery
2
Learning Outcome: Apprentices will be able to discover information about DNS servers, configure IPTables to impede malicious hackers, run traceroute scans, and running a query to see if the port is open to ICMP packets.
Preliminary Scanning
1
Learning Outcome: Apprentices will be able to identify systems on a network of responsibilities. Apprentices will also be able to identify other devices on the laboratory network, to include computers and network infrastructure devices, such as routers.
Parse Files Out of Network Traffic
1
Learning Outcome: Apprentices will be able to use the network traffic analysis tools, Wireshark and Network Miner to analyze network traffic and identify potential file transfers and extract files.
Specialized Linux Port Scans
1
Learning Outcome: Apprentices will be able to leverage Hping3 to assess ports of various devices on the assigned network.
CompTIA Security+
10
Learning Outcome: Apprentices will have the skills to perform proficiently in topics such as threats, vulnerabilities and attacks, systems security, network infrastructure, access control, cryptography, risk management, and organizational security.
CompTIA Security+ 501
30
Learning Outcome: Apprentices will have the skills mastered that will be needed to be a security professional.
Using Snort and Wireshark to Analyze Traffic
1
Learning Outcome: Apprentices will have the skills needed to critically inspect network traffic and detect suspicious activity. Apprentices will also be able to use Snort and Wireshark to quickly and effectively scan and understand what's happening in their network.
Threat Designation
1
Learning Outcome: Apprentices will have the skills to conduct scans against a web server, a file share, a printer and a user’s host device.
Fundamental Vulnerability Management
1
Learning Outcome: Apprentices will have the skills needed to use the popular scanning tools, delivery of progress reports, and implementation of increased systems coverages.
Penetration Testing and Ethical Hacking
14
Learning Outcome: Apprentices will have the skills and tools that are required for the development and application of an effective vulnerability prevention strategy to prevent attackers from entering key systems.
Certified Ethical Hacker (CEH)
25
Learning Outcome: Apprentices will have the skills mastered that are needed to be a capable ethical hacker.
Applying Filters to TCPDump and Wireshark
1
Learning Outcome: Apprentices will have mastered the skills to becoming efficient and effective at conducting security task.
Security Assessment & Testing
1
Learning Outcome: Apprentices will have the skills to manage risks involved in developing, operating, and sustaining systems and capabilities.
Identifying System Vulnerabilities with OpenVAS
1
Learning Outcome: Apprentices will be able to scan a system in OpenVAS to discover and identify systems on the network that have vulnerabilities.
Implement Single System Changes in Firewall
1
Learning Outcome: Apprentices will have mastered the skills for network interface configuration, Pfsense firewall initial set-up, firewall rules, and the importance of blocking/allowing TCP/UDP ports.
Manual Vulnerability Assessment
1
Learning Outcome: Apprentices will be able to perform a risk assessment based on the findings from the previous vulnerability audits and determine appropriate mitigation actions.
Performing an Initial Attack Analysis
1
Learning Outcome: Apprentices will have the skills to perform incidence response on a compromised machine, collect volatile data and have the skill to ability to manipulate data.
Advanced Techniques for Malware Recovery
1
Learning Outcome: Apprentices will have the skills to analyze processes, DLLs, registry edits and other auto start functions to locate and remove malicious software from an infected Windows 7 victim machine.
Analyze and Classify Malware
1
Learning Outcome: Apprentices will have the skills to create and conduct basic static analysis of a malicious executable file.
Dynamic Malware Analysis Capstone
1
Learning Outcome: Apprentices will have the skills to capture network traffic by using the simple “man-in-the-middle” system.
CompTIA Cybersecurity Analyst (CySA+)
15
Learning Outcome: Apprentices will have the skills to analysis and defense techniques leveraging data. Apprentices will have the tools to identify risks to an organization and they will know how to apply effective mitigation strategies.
CompTIA CySA+
27
Learning Outcome: Apprentices will have the skills to identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface.
Vulnerability Scan Analysis
2
Learning Outcome: Apprentices will have the skills to Identify, Mitigate, Scan, Analyze and Remediate Network Vulnerabilities pertaining to an organization's IT Infrastructure and assess the Threat Environment on the basis of confirmatory audits of the basic IT/Cyber Security CIAAN Privacy Principles.
Vulnerability Scanner Set-up and Configuration
1
Learning Outcome: Apprentices will have the skills to perform a Risk assessment based on the findings from the previous vulnerability audits and determine appropriate mitigation actions.
Vulnerability Scanner Set-up and Configuration, Pt. 2
1
Learning Outcome: Apprentices will have the skills to perform confirmatory assessments of systems or networks according to an audit policy.
Monitoring Network Traffic
1
Learning Outcome: Apprentices will have the skills to interpret the information collected by network tools, detect host and network-based intrusions via intrusion detection technologies, and perform packet-level analysis.
Analyze SQL Injection Attack
1
Learning Outcome: Apprentices will have the skills to recognize and validate SQL Injection Attacks against an environment.
Creating Recommendations Based on Vulnerability Assessments
1
Learning Outcome: Apprentices will have the skills to perform assessments of systems or networks according to an audit policy.
Advanced Penetration Testing
20
Learning Outcome: Apprentices will have the skills on how to attack from the web using cross-site scripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of a network that they are breaking into.
Denial of Service PCAP Analysis
1
Learning Outcome: Apprentices will have the skills to perform a Denial of Service attack.
Centralized Monitoring
1
Learning Outcome: Apprentices will have the skills to remotely visualize and analyze data through various forms of technology.
Computer and Hacking Forensics
10
Learning Outcome: Apprentices will have the skills to; determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless activity.
Metasploit
6
Learning Outcome: Apprentices will have the skills to use the Metasploit framework software for penetration testing and be able to offer their organization even better security and protection from cyber-attacks.