The Cybersecurity Analyst Specialization equips learners with job-ready skills to detect, analyze, and respond to modern cyber threats in enterprise environments. Aligned with real-world SOC practices, it integrates threat intelligence, ethical hacking, vulnerability management, digital forensics, incident response, and AI-driven security into a unified defensive framework.
Across four courses, learners build foundations in cyber threats, Linux security operations, and frameworks such as MITRE ATT&CK and the Cyber Kill Chain. They advance into reconnaissance, vulnerability scanning, remediation workflows, SIEM monitoring, endpoint detection, forensic investigation, and full incident response lifecycles.
The program also explores AI-driven SOC automation, secure prompt engineering, adversarial ML defenses, and AI governance. By completion, learners are prepared to operate confidently in cybersecurity analyst, SOC, and blue team roles.
Applied Learning Project
Learners complete hands-on security projects across threat analysis, penetration testing, incident response, and AI-driven security automation. Projects include performing reconnaissance and vulnerability scanning with Nmap and Nikto, building remediation dashboards, analyzing SIEM alerts and forensic artifacts, simulating containment and eradication procedures, and mapping full attack lifecycles using MITRE ATT&CK. The final capstone integrates detection, investigation, response, and AI-assisted security workflows to demonstrate end-to-end cybersecurity analyst readiness.
















