The code of human interaction and effective communication
The art of persuasion
Mastering team dynamics
Sharpen your critical thinking
Self-awareness and emotional intelligence
Resilience
Manage time
Receive feedback without getting defensive
Digital Group Communications
Email etiquette
Proper Introductions
Principles of digital citizenship like authenticity, respect, humility
Communicating with large groups of people
Verbal communication in 1:1 settings
Introduction to the technology stack
Introduction to tools and platforms
Introduction to Security
Threat Management
Threats and Attacks
Endpoint Application Development
Mobile Device Security
Information Technology Project Management/Encryption & Hashing
Introduction to Digital crime/Forensics
The Basics
Keys and Protocols
Networking Threats
Network Applications
Cloud and Virtualization
Wireless Networks
Authentication
Incidents
Risk Management
OSI Layers, Ports, and Protocols
Network Components & Topologies
Network Topologies, Types, and Technologies
WAN Technologies
Logical and Physical Topologies
Identifying Topologies
Discovering Network Components and Locations
Deploying Appropriate Cable Solutions
IP Addressing
Ethernet Switching
IP Routing and Forwarding
Identifying TCP/IP Misconfigurations
Network Devices
Ports, Protocols, and Network Services
Virtualization and Network Storage
Cloud Concepts and Purposes
Device Placement and Configuration
Network Device Locations
Advance Network Devices
Routing, Bandwidth, and Switching
Defining Dynamic Routing Protocols
Identifying Network Descriptions
Wireless Technologies, Configurations, and Security
Identifying Antenna Types
Matching Wireless Standards & Maximum Speeds
Defining Security Standards
Ensuring Network Availability
Network Diagrams and Documentation
Business Continuity and Disaster Recovery
Defining Redundancy Protocols
Basic Wireless Network Security
Security Concepts and Attacks
Defining Network Attacks
Scanning, Monitoring, and Patching
Remote Access Methods
Physical Security and Network Attacks
Troubleshooting Methodology
Networking & Cabling Problems
Identifying Network Testing Tools
Defining Physical Layer Issues
Wired Connectivity and Performance Issues
Tools, Commands, and Performance
On-the-job training
Develop computer or information security policies or procedures
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Understands and executes routine company processes.
Update knowledge about emerging industry or technology trends.
Monitor current reports of computer viruses to determine when to update virus protection systems. Understands technologies and platforms utilized to complete investigations.
Implement security measures for computer or information systems.
Encrypt data transmissions or erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Modify computer security files to incorporate new software, correct errors, or change individual access status.
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations
Become efficient in multiple Security Information and Event Management (SIEM) software. Understand use of SEIM solutions to detect incidents through signature and anomaly-based detection technologies.
Understand the different areas within an alarm and what warrants deeming an event as malicious or non-malicious activity.
Test computer system operations to ensure proper functioning.
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. Understand various platforms and their uses.
Collaborate with others to resolve information technology issues.
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Provide appropriate customer service for customer needs.
Document operational procedures.
Document computer security and emergency measures policies, procedures, and tests. Understand processes for handling internal outages and the escalation flow when such events occur.
Troubleshoot issues with computer applications or systems.
Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
Consult with customers or other departments on security events or technical issues, such as outages or compromise.
Coordinate project activities with other personnel or departments.
Coordinate implementation of computer system plan with establishment personnel and outside vendors. Uses client/customer requirements to determine investigation requirements.
Monitor the security of digital information.
Monitor use of data files and regulate access to safeguard information in computer files. Create cases based on host impacted, host origin, location, types of attach, executable files etc…Review repeat alarms create service requests and elevate to proper analyst.
Monitor functioning of equipment to ensure system operates in conformance with specifications.
Train others in computer interface or software use.
Provide customer training, as appropriate, to attain necessary information to address customer concerns. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Demonstrate an understanding of end-to-end Security Operations Center (SOC) workflow.
Understand organizational hierarchy and workflow for the Security Operations Center (SOC). Includes SOC procedures, technologies, and processes to collect, triage, report, respond, and document the incident.
Full service case load with supervision
Acclimate to full customer load. Mentor will be available to field questions and issues. Mentor will validate quality of performance of duties. Review cases and investigations to validate that they meet requirements and service level agreements. Remedial training as required.
Business Acumen/Employability Skills
Understand business mission and goals; Apply effective people and project management skills; Apply critical-thinking skills to solve problems; Plan and prioritize work to manage time; Working cooperatively and give full attention to what others are saying to effectively communicate.
Interested in this apprenticeship?
Sign up to receive notifications about changes and updates about Network Security Analyst .