Cyber Security Analyst (MSCS)
100% Online. Flexible. Accredited

INQUIRE NOW





    Cyber Security Analyst

    100% Online. Flexible. Accredited

    INQUIRE NOW





      Cyber Security Analyst (MSCS)

      Overview

      The Security Analyst specialization focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, pen testing, and securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.

      By specializing as a Security Analyst, you will be trained in various domains through specialized online ethical hacking and penetration testing courses.

      Program Summary

      LEVEL OF STUDY

      Graduate

      NUMBER OF COURSES

      12 (36 Credit Hours)

      DURATION

      2 Years – 12-week terms (4 per year)

      TERM BEGINS ON

      October 4th, 2022

      MODE OF STUDY

      Online (Flexible with Hands-On Experience)

      What Our Students Say

      Pieter

      EC-Council University has been ranked in the “Top 45 Online Master’s in Internet Security Degree Programs” by Intelligent.com, highlighting our high standards of quality postsecondary education.

      intelligent 2022

      Job Roles

      • Information Security Manager/Specialist
      • Information Security Auditor
      • Risk/Vulnerability Analyst/Manager
      • Information Security Analyst
      • Penetration Tester
      • Security Architect
      • Computer Network Defender
      • Cybersecurity Defense Analyst
      • Information Security (IS) Director
      • Information Assurance (IA) Program Manager
      • IT Project Manager
      • Application Security Engineer/Manager
      • Enterprise Architect
      • Security Architect
      • Research & Development Specialist
      • Systems Requirements Planner
      • System Testing and Evaluation Specialist
      • Information Systems Security Developer
      • Systems Developer
      • Technical Support Specialist
      • Network Operations Specialist
      • System Administrator
      • Systems Security Analyst
      • Cyber Defense Analyst
      • Cyber Defense Infrastructure Support Specialist
      • Vulnerability Assessment Analyst
      • Warning Analyst
      • Exploitation Analyst
      • All-Source Analyst
      • Mission Assessment Specialist
      • Target Developer
      • Target Network Analyst
      • Multi-Disciplined Language Analyst
      • All Source-Collection Manager
      • All Source-Collection Requirements Manager
      • Cyber Intel Planner
      • Cyber Ops Planner
      • Partner Integration Planner
      • Cyber Operator
      • Chief Information Security Officer
      • Information Security Officer
      • Chief Security Officer
      • Information Assurance Security Officer

      Industry Certifications Included in the Program!

      ECCU understands the current need of students to be industry-ready; thus, all of EC-Council’s relevant industry certifications have been included in the various specializations, allowing the student to graduate with not only a Master’s degree, but a string of certifications as well.

      Certifications Master’ Degree Courses ECCU Student Price
      Certified Network Defender ECCU 500
      Managing Secure Network Systems
      Included
      Certified Ethical Hacker ECCU 501
      Ethical Hacking & Countermeasures
      Included
      Licensed Penetration Tester ECCU 503
      Security Analysis and Vulnerability Assessment
      ECCU 506
      Conducting Penetration and Security Tests
      Included
      Exam Fee: $799

      Pricing

      $540/Per Credit
      Hour
      $540/Per Credit
      Hour
      • LPT (Master) Certification: $1000
      • Total Tuition Fee: $20, 440

      *The LPT (Master) certification is an 18-hour, live, online, fully proctored examination that comes with multiple cyber ranges. The Advanced Penetration Testing Cyber Range (ECCAPT) contains more than 180 machines, with more than 250GB RAM and more than 4000GB of storage segregated in complex network ranges with multiple militarized and demilitarized zones.

      FAQs

      Ans. Candidates interested in cybersecurity can opt for a Master of Science in Cyber Security (MSCS) with a Security Analyst specialization to become a professional cybersecurity analyst. An MSCS degree from EC-Council University (ECCU) will not only help aspirants gain important skills, but it will also help them gain relevant industry-ready certifications.

      Ans. An information security analyst is responsible for monitoring, preventing, and stopping any attack from affecting the company and its private data. They create and implement firewalls and software systems to protect the network infrastructure and sensitive data from being stolen. Security analysts can work as freelance consultants in the public sector or for businesses.

      Ans.  An aspiring security analyst professional need to have some fundamental skills that will help them fulfill job roles. Those skills include — networking, security, communicating and documenting incidents, and incident response and handling.

      Ans. A cybersecurity analyst, after completing an online security analyst program and gaining an experience of 1 to 4 years, can earn an average compensation of $70,906 according to PayScale. Whereas, a cybersecurity analyst with an experience of 5-9 years of experience earns an average compensation of $88,104.

      Disclaimer – EC-Council University does not guarantee jobs or salary packages mentioned -above. Please refer to the sources mentioned to learn more.

      Course Description

      ECCU 503 Security Analysis and Vulnerability Assessment

      This course focuses on how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. This course investigates ways of applying knowledge to real-world problems. Topics include Introduction to Penetration Testing and Methodologies, Penetration Testing Scoping and Engagement, Open-Source Intelligence (OSINT), Social Engineering Penetration Testing, External Network Penetration Testing, Internal Network Penetration Testing, and Network Penetration Testing for Perimeter Devices.

      ECCU 505 Introduction to Research and Writing for the IT Practitioner

      Three Credit Hours

      This foundational core course introduces students to basic English writing skills and research methods also including APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

      ECCU 506 Conducting Penetration and Security Tests

      This course focuses on the mastery of the advanced penetration testing skills that real-world practitioners face in the job.
      The course pushes students beyond the limits of the traditional curriculum to broaden knowledge to pursue an independent inquiry. Topics include Web Application Penetration Testing, Wireless Penetration Testing, IoT Penetration Testing, OT and SCADA Penetration Testing, Cloud Penetration Testing, Binary Analysis and Exploitation, and Report Writing and Post Testing Actions.

      MGMT 502 Business Essentials

      Three Credit Hours

      This course will lay a broad foundation of understanding the processes of global business principles  for a varied population of students who work in businesses of all kinds (including the IT and IA fields). It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), application software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforce the business principles.

      ECCU 504 Foundations of Organizational Behavior for the IT Practitioner

      Three Credit Hours

      This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics, and project management as seen through the organizational lens.

      ECCU 516 The Hacker Mind: Profiling the IT Criminal

      Three Credit Hours

      Cyberspace has increased human communication, connectivity, creativity, capacity and crime by leaps and bounds in the last decade. For all of the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to an international terrorist. The IT criminal threatens businesses, governmental agencies, militaries, and organizations of every kind. This course will survey the spectrum of psychological attributes that may make up the profile of the IT criminal.

      ECCU 514 Quantum Leadership

      Three Credit Hours

      This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation for understanding the process of leadership. The study describes the roles, functions, and impact of global leadership concepts. Many team exercises provide the speed at which leaders must work. Research and views into how most cultures respond to this area of management are provided.

      ECCU 500 Managing Secure Network Systems

      Three Credit Hours

      This course focuses on evaluating network and Internet security issues, designing and implementing successful security policies and firewall strategies, and exposing the system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering, proxy servers, Bastion hosts and honey pots, hardening routers, hardening security, email security, virtual private networks, and creating fault tolerance.

      ECCU 507 Linux Networking and Security

      Three Credit Hours

      This course focuses on configuring a secure Linux network using the command line and graphical utilities. Emphasis is placed on file-sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.

      ECCU 501 Ethical Hacking & Countermeasures

      Three Credit Hours

      This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.

      ECCU 503 Security Analysis and Vulnerability Assessment

      Three Credit Hours

      This course focuses on how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. This course investigates ways of applying knowledge to real-world problems. Topics include Introduction to Penetration Testing and Methodologies, Penetration Testing Scoping and Engagement, Open-Source Intelligence (OSINT), Social Engineering Penetration Testing, External Network Penetration Testing, Internal Network Penetration Testing, and Network Penetration Testing for Perimeter Devices.

      ECCU 506 Conducting Penetration and Security Tests

      Three Credit Hours

      This course focuses on the mastery of the advanced penetration testing skills that real-world practitioners face in the job. The course pushes students beyond the limits of the traditional curriculum to broaden knowledge to pursue an independent inquiry. Topics include Web Application Penetration Testing, Wireless Penetration Testing, IoT Penetration Testing, OT and SCADA Penetration Testing, Cloud Penetration Testing, Binary Analysis and Exploitation, and Report Writing and Post Testing Actions.

      ECCU 509 Securing Wireless Networks

      Three Credit Hours

      This course focuses on the various methods of securing wireless networks, including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN security, digital cellular telephone, fixed wireless, and wireless communications in business.