Security Analyst to Security Architect

R12 789.00

Being protected from security threats is a crucial part of any organisation. While Security Analysts focus on monitoring, analysing, and responding to security incidents, Security Architects design and implement security frameworks and strategies. Security Architects have a broader role in shaping the overall security posture of an organisation.

Online books Digital learning
Clock Start anytime
Study duration (Months)
Computer Skillsoft LMS access
Teacher and student Online Skillsoft mentor
Certificate Certified by Optimi College

Course fee: R12 789.00

Deposit: R2 200.00

Monthly instalment: R882.42

Payment duration: 12 months

Study duration: We recommend a total of 120 hours of study, e.g. study 1 hour per day and complete your course in 4 months.

Skillsoft course access: 12 months

 

Course code: C01186

 

Course overview:

  • Track 1: The focus will be on cybersecurity fundamentals, system security, and information security.
  • Track 2: The focus will be on end-user awareness, anomaly detection, digital forensics, digital ethics & privacy, risk analysis, software assessment & audits, and cryptography.
  • Track 3: The focus will be on vulnerability management, IDS/IPS, authentication, secure coding, tracking incidents, developing security topologies, and security architectures.
  • Track 4: The focus will be on rules of engagement, ethical hacking, intelligent security orchestration, regulatory mandates, breach notification process, triage automation, and a unified security playbook.

 

What are Aspire Journeys?

Aspire Journeys are guided learning paths designed and published by Skillsoft. These courses provide:

      • A clear starting point across the roles and responsibilities of tomorrow.
      • Exercises for on-the-job applications to put what you’ve learned into practice.
      • Verifiable, shareable, and portable digital badges so you can celebrate accomplishments along the way.
      • A diverse array of learning tools from the books to audiobooks to video courses, and more.

The learning path for each journey comprises tracks of content in a recommended order. Completing all content within a track completes the track. Completing all tracks within the journey completes the journey.

 

Modules and topics covered:

Security Analyst Track 1: Security Analyst

Cybersecurity 101: Session & Risk Management
Cybersecurity 101: Auditing & Incident Response
An Executive’s Guide to Security: Understanding Security Threats
An Executive’s Guide to Security: Protecting Your Information
Information Security: APT Defenses
Information Security: NACs & Gateways
Information Security: Subnetting & DNS for Security Architects
Information Security: Securing Networking Protocols
Information Security: Hardened Security Topologies
Information Security: Continual Infrastructure Testing
Information Security: Security Governance
Information Security: Honeypots
Information Security: Pen Testing
Security Analyst

Security Architect Track 2: Forensics Analyst

End-User Security: The End-User Perspective
End-User Security: The Security Administrator Perspective
End-User Security: Securing End Users against Attackers
Anomaly Detection: Aspects of Anomaly Detection
Anomaly Detection: Network Anomaly Detection
Digital Forensic Techniques & Investigative Approaches
Ethics & Privacy: Digital Forensics
Risk Analysis: Security Risk Management
Cryptography: Introduction to Cryptography Services
Cryptography: Introduction to PKI

Security Architect Track 3: Vulnerability Analyst

Security Vulnerabilities: Managing Threats & Vulnerabilities
Intrusion Detection: Best Practices
Intrusion Prevention: Best Practices
Authentication & Encryption: Best Practices
Security Topologies: Developing Secure Networks
Security Architect: Secure Coding Concepts
Security Architectures: Defensible Security
Vulnerability Analyst

Security Architect Track 4: Security Architect

Security Rules: Rules of Engagement
Security Architect: Ethical Hacking Best Practices
Intelligent Orchestration: Automating Security Incident Processing
Regulatory Mandates: Security Program Regulatory Integration
Data Security Breach Notification Process
Security Incident Triage
Unified Security: Playbook Approach to Security
Security Architect

Academic grade: No minimum school pass requirements or formal prerequisites, but it is recommended that candidates have some experience in the lab or field.

Language: Proficiency in English (course material and support only available in English).

Expertise level: Intermediate

Equipment: Access to a PC or laptop with a reliable internet connection.

Effort: Self-paced learning online.

Course type: Short course

Industry partner: Skillsoft

Certification: Certificate confirming course completion.

Certification issued by: Optimi College

Assessment information:

Each track concludes with a final internal exam that will test your knowledge and application of the topics presented throughout that specific track. There are no external certification exams for this course.

Dedicated support team

We understand that students may require guidance and support to navigate the learning journey, and our Client Services team is always ready to assist them in every possible way. Our team is readily available during office hours and can be contacted via email, phone, WhatsApp and social media.

Skillsoft Learner Management System (LMS) access

Skillsoft is an online learning management system that offers all students enrolled for any of our IT Academy courses compelling content, interactive videos, quizzes, mentoring and practical simulations/virtual labs. The platform allows students to learn at their own pace.

"*" indicates required fields

Are you still in school?*
When do you want to start?*
Do you require financial assistance?
Optimi College is in partnership with Student Hero. By selecting “yes” you consent to share your name and contact information with Student Hero so that they can assist you with seeking financial aid.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
*Selected IT classes at the Bellville campus (Cape Town) only
This field is for validation purposes and should be left unchanged.