Security Analyst

Overview

The Security Analyst specialization focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, pen testing, securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.

By specializing as a Security Analyst, you will be trained in various domains, through specialized online ethical hacking and penetration testing courses.

Program Summary

LEVEL OF STUDY

Graduate

NUMBER OF COURSES

12 (36 Credit Hours)

DURATION

2 Years – 12 week terms (4 per year)

TERM BEGINS ON

6th Jan, 2020

MODE OF STUDY

Online (Flexible with Hands-On Experience)

Job Roles

  • Information Security Manager/Specialist
  • Information Security Auditor
  • Risk/Vulnerability Analyst/Manager
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Computer Network Defender
  • Cybersecurity Defense Analyst
  • Information Security (IS) Director
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Application Security Engineer/Manager
  • Enterprise Architect
  • Security Architect
  • Research & Development Specialist
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Cyber Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Exploitation Analyst
  • All-Source Analyst
  • Mission Assessment Specialist
  • Target Developer
  • Target Network Analyst
  • Multi-Disciplined Language Analyst
  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Intel Planner
  • Cyber Ops Planner
  • Partner Integration Planner
  • Cyber Operator
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Industry Certifications Included in the Program!

ECCU understands the need today of students to be industry ready and thus all of EC-Council’s relevant industry certifications have been included in the various specializations, allowing the student to graduate with not only a Master’s degree but, a string of certifications as well.


Certification

Master

Degree Courses

ECCU 500

Managing Secure Network Systems

ECCU 501

Ethical Hacking & Countermeasures

ECCU 503

Security Analysis and Vulnerability Assessment

ECCU 506

Conducting Penetration and Security Tests

EC-Council

Examination Price


$350 + $100

Application Fee


$950 + $100

Application Fee


$999 + $100

Application Fee


$899 + $100

Application Fee

ECCU

Student Price



Included in the Program



Included in the Program


Included in the Program


Exam Fee: $800

iLab Fee: $200

Pricing

Region 1

$540/Per Credit
Hour
$540/Per Credit
Hour
  • LPT (Master) Certification: $800 (Exam Fee) + $200 (iLab Fee)
  • Total Tuition Fee: $20, 440

Region 2

$473/Per Credit
Hour
$473/Per Credit
Hour
  • LPT (Master) Certification: $800 (Exam Fee) + $200 (iLab Fee)
  • Total Tuition Fee: $18,028

Region 3

$405/Per Credit
Hour
$405/Per Credit
Hour
  • LPT (Master) Certification: $800 (Exam Fee) + $200 (iLab Fee)
  • Total Tuition Fee: $15,580

*The LPT (Master) certification is an 18 hour, live, online, fully-proctored examination that comes with multiple cyber ranges. The Advanced Penetration Testing Cyber Range (ECCAPT) contains more than 180 machines, with more than 250 GB RAM and more than 4000 GB of storage segregated in complex network ranges with multiple militarized and demilitarized zones.

Course Description

ECCU 505 Introduction to Research and Writing for the IT Practitioner

Three Credit Hours


This foundational core course introduces students to basic English writing skills and research methods also including: APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

MGMT 502 Business Essentials

Three Credit Hours

This course will lay a broad foundation of understanding the processes of business principles globally and for a varied population of students who work in businesses of all kinds including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), applications software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforces the business principles.

ECCU 504 Foundations of Organizational Behavior for the IT Practitioner

Three Credit Hours

This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effec tive communication, team building, ethics and project management as seen through the organizational lens.

ECCU 516 The Hacker Mind: Profiling the IT Criminal

Three Credit Hours

Cyber space has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to the international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes which may make up the profile of the IT criminal.

ECCU 514 Quantum Leadership

Three Credit Hours

This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation of understanding the process of leadership. The study describes the roles, functions and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided.

ECCU 500 Managing Secure Network Systems

Three Credit Hours


This course focuses on evaluating network and Internet security issues, designing, implementing successful security policies and firewall strategies, exposing system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion host and honey pots, hardening routers, hardening security, email security, virtual private networks and creating fault tolerance.

ECCU 507 Linux Networking and Security

Three Credit Hours


This course focuses on configuring a secure Linux network using command line and graphical utilities. Emphasis is placed on file sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.

ECCU 501 Ethical Hacking & Countermeasures

Three Credit Hours


This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.

ECCU 503 Security Analysis and Vulnerability Assessment

Three Credit Hours


This course focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure. Topics include penetration testing methodologies, test planning and scheduling, information gathering, password cracking penetration testing and security analysis, social engineering penetration testing and security analysis, internal and external penetration testing and security analysis, router penetration testing and security analysis, and reporting and documentation.

ECCU 506 Conducting Penetration and Security Tests

Three Credit Hours


This course focuses on mastery of the international standard for penetration testing. Topics include customers and legal agreements, penetration testing planning and scheduling, information gathering, external and internal network penetration testing, router penetration testing, firewalls penetration testing, intrusion detection system penetration testing, wireless networks penetration testing; password cracking penetration testing, social engineering penetration testing, PDA and cell phone penetration testing, and penetration testing report and documentation writing.

ECCU 509 Securing Wireless Networks

Three Credit Hours

This course focuses on the various methods of securing wireless networks including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN Security, digital cellular telephone, fixed wireless, and wireless communications in business.