Security Analyst II

As a Security Analyst II, you will begin to apply common external datasets and tools to enhance your investigations. You will start running investigations with less guidance, connecting evidence across systems and making your own calls about when to dig deeper versus when to move on.

Path Overview

📚
7
Modules
⏱️
~6
Hours
Sign in to track your progress
What employers look for
  • Conduct end-to-end incident investigations from initial alert through to report
  • Correlate evidence across endpoint, network, authentication, and email logs
  • Identify lateral movement, persistence mechanisms, and C2 activity
  • Analyse phishing campaigns and malicious email attachments or links
  • Pivot on indicators (IPs, hashes, domains, usernames) across multiple data sources

Curriculum

1
The Blame Game: Why hackers be hacking
~1.0 hrsEasy
2
Whiskermania: An Intro to Network Concepts
~1.0 hrsChallenging
3
Solvi Systems: A tale of Supply Chains and ICS
~1.0 hrsEasy
4
KQL 101: An introduction to Kusto Query Languge
~1.0 hrsEasy
5
Decoding101: A beginner's guide to decoding
~1.0 hrsEasy
6
Valdoria Votes: A Political Mystery (Part 2)
~1.0 hrsEasy
7
Inside Encryptodera: An Insider Threat Scenario
~1.0 hrsChallenging

Loading...