Computer And Information Systems Security Analyst


Why Choose Us

Employment Objective

68 students review

Computer And Information Systems Security Analyst Program Description

Computer And Information Systems Security Analyst Program that prepares individuals to assess the security needs of computer and network systems, recommend safeguard solutions, and manage the implementation and maintenance of security devices, systems, and procedures. Includes instruction in computer architecture, programming, and systems analysis networking telecommunications cryptography security system design applicable law and regulations risk assessment and policy analysis contingency planning user access issues investigation techniques and troubleshooting.

 

Income Expectation

$101,200/yr

The average salary for a Computer And Information Systems Security Analyst is $101,200 in New York City. Salary estimates are provided by CompTIA.

Computer And Information Systems Security Analyst Program Objectives

Describe basic concepts related to network security.

  • Describe basic concepts related to network security.
  • Prevent security breaches.
  • Respond to security incidents.
  • Identify the components of a remote network implementation.
  • Identify the tools, methods, and techniques used in managing a network.
  • Describe troubleshooting of issues on a network.
  • Identify the hardware components of personal computers and mobile digital devices.
  • Identify the basic components and functions of operating systems.
  • Identify networking and security fundamentals.
  • Identify the operational procedures that should be followed by professional PC technicians.
  • Install, configure, and troubleshoot display devices.
  • Install and configure peripheral components.
  • Manage system components.
  • Manage data storage.
  • Install and configure Microsoft Windows.
  • Optimize and maintain Microsoft Windows.
  • Work with other operating systems.
  • Identify the hardware and software requirements for client environment configurations.
  • Identify network technologies.
  • Install and configure networking capabilities.
  • Support mobile digital devices.
  • Support printers and multifunction devices.
  • Identify security threats, vulnerabilities, and controls0.
  • Implement security controls.
  • Troubleshoot system-wide issues.
Computer And Information Systems Security Analyst Program Outline

Hardware

BIOS

    Motherboards and Motherboard Components. RAM. Random Access Memory, w/ troubleshooting PC Expansion Cards. Storage w/troubleshooting The CPU Including 1.11: PC Connections and Connectors Power & Power Supplies w/troubleshooting The Right PC: Home Assignment with Exam. Video and Sound Completed with 1.7 above. Install and configure common peripheral devices. Printers: Install & Configure Printers: Different Technologies Printers: Maintenance.

Networking

  • Cables & Connectors
  • Cable Characteristics.
  • TCP/IP
  • TCP/IP & UDP Ports
  • WIFI Networking.
  • SOHO Networking, Install and Configure.
  • Connection Types
  • Connection Devices.
  • Networking Tools of the Trade.

Mobile Devices

  • Laptop Hardware & Components
  • Laptop Components
  • Laptop Features.
  • Other Mobile Devices: Tablets, Phones, etc.
  • Accessories and Ports’

Hardware and Network Troubleshooting

  • This objective covered in 1.0 above
  • This objective covered in 1.0 above
  • This objective covered in 1.0 above
  • This objective covered in 2.0 above
  • This objective covered in 1.0, 2.0, or 3.0 above.
  • This objective covered in 1.0 above.

Windows Operating Systems

  • Compare Operating Systems Windows Vista, 7, 8, & 8.1
  • Operating System Installation
  • Command Line Tools.
  • OS Features and Tools.
  • The Control Panel
  • Install Networking on a Desktop.
  • Preventative Maintenance and Tools

Other Operating Systems

  • MAC OS and Linux
  • Virtualization
  • The Cloud
  • Network Hosts
  • Mobile Operating Systems: Android, IOS, etc.
  • Install and Configure Mobile OS systems.
  • Mobile Data synchronization

Security

  • Common Threats and Vulnerabilities
  • Prevention
  • OS Security Settings.
  • Deploy Security Best Practices per Workstation
  • Securing the mobile device
  • Data Disposal and Destruction
  • Secure a SOHO wired and wireless network.
  • Software Troubleshooting
  • Operational Procedures.

Introduction to Ethical Hacking & Footprinting and Reconnaissance

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Scanning Networks & Enumeration

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Vulnerability Analysis & System Hacking

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Malware Threats & Sniffing

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Social Engineering & Denial-of-Service

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

Certification Exam

CompTIA A+ Certification 220-1001/220-1002

CompTIA Security+ Certification SYO-501

 

 

75 Hour Program

 
SCHEDULE DATES - 75 Hour Program
 
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date & Graduation Date
10/21/2019 to 11/01/2019
5 Days (40 Hours) a Week for 2 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date & Graduation Date
11/11/2019 to 11/22/2019
5 Days (40 Hours) a Week for 2 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekends)
Start Date & Graduation Date
11/30/2019 to 02/20/2020
2 Days (16 Hours) a Week for 10 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date & Graduation Date
12/02/2019 to 12/13/2019
5 Days (40 Hours) a Week for 2 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date & Graduation Date
12/23/2019 to 01/03/2020
5 Days (40 Hours) a Week for 2 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date & Graduation Date
01/13/2020 to 01/24/2020
5 Days (40 Hours) a Week for 2 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekends)
Start Date & Graduation Date
03/14/2020 to 05/16/2020
2 Days (16 Hours) a Week for 10 Weeks
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date
Graduation Date
10/21/2019
11/01/2019
5 Days (40 Hours) a Week for 2 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date
Graduation Date
11/11/2019
11/22/2019
5 Days (40 Hours) a Week for 2 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekends)
Start Date
Graduation Date
11/30/2019
02/20/2020
2 Days (16 Hours) a Week for 10 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date
Graduation Date
12/02/2019
12/13/2019
5 Days (40 Hours) a Week for 2 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date
Graduation Date
12/23/2019
01/03/2020
5 Days (40 Hours) a Week for 2 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekdays)
Start Date
Graduation Date
01/13/2020
01/24/2020
5 Days (40 Hours) a Week for 2 Weeks Enroll Now
Computer and Information Systems Security Analyst
9AM - 5PM (Weekends)
Start Date
Graduation Date
03/14/2020
05/16/2020
2 Days (16 Hours) a Week for 10 Weeks Enroll Now
  • CompTIA
  • CISCO
  • EC-Council
computer and information systems security analyst, iitlearning, a plus certification, a+ training course, security classes, computer security certification, security certification, comptia it, certification training, security+

Why Choose Us?

We provide quality education

  • Institute of Information Technology is approved by the U.S. Department of Homeland Security for Education and Training
  • Institute of Information Technology is approved by the NYS Education Department
  • Teachers are licensed by the NYS Education Department
  • Approved by NYS Labor Department
  • Approved by Workforce1 Development
  • Approved by Adult Career and Continuing Education Services-Vocational Rehabilitation (ACCES-VR)
  • Course Contents are approved by Authorized Partners
  • Unlimited Practice Exam

We use up-to-date course content

  • Real work Experience from Expert Certified Instructors
  • Authorized Partner Approved Course Contents
  • Hands-On Instructor-Led Classroom Training
  • Simulations of Real Work Projects
  • Limitless Practice Exams
  • One-On-One Help
  • Group Study
  • Lab Practice
  • Mentoring

We value your time & investment

  • Extra Help if Needed, At No Cost, Until You Are Certified!
  • Students can repeat class until certified at no cost
  • MetroCard will be given to students
  • Payment Plan for Eligible Students
  • Lunch will be provided to students
  • Textbooks included in tuition fee
  • Free Job Placement Assistance
  • Graduates & Career Services
  • Certification Exams Center
  • Discount Exam Vouchers
  • Affordable Tuition Fee
  • Mock Interview