Start To New Journey
Cybersecurity Analyst (CSA)
The Cyber security Analyst (CSA) program is designed to train students in defensive cyber security operations. The course focuses on threat detection, log analysis, incident response, and SOC operations, preparing students for entry-level SOC Analyst (Tier-1) roles.
Cybersecurity Analysis That Protects Digital Assets
Upon successful completion of this course, learners will be able to monitor and analyze security events, detect and investigate cyber threats, perform log analysis, use SIEM and threat intelligence tools, and apply incident response procedures. The program prepares learners for Cybersecurity Analyst (CSA) roles by building practical skills aligned with modern security operations and industry best practices.
Duration
2 Months
Sessions
24
Classes Days
Mon, Wed, Fri
Summary Of The Course
The Cybersecurity Analyst (CSA) program helps learners build a strong foundation in core cybersecurity concepts, security monitoring, and threat analysis. Students gain hands-on experience with log analysis, SIEM tools, threat intelligence, and incident response techniques in practical lab environments—enabling them to detect, investigate, and respond to security incidents. The course prepares participants with essential skills required for entry-level Cybersecurity Analyst and SOC roles.
- Understand modern cyber threats and attack patterns
- Monitor systems and networks for suspicious activity
- Analyze logs and security alerts
- Perform incident response at a basic level
- Prepare professional security incident reports
After completing this course, students will be able to:
- Identify and analyze cybersecurity threats
- Perform basic SOC monitoring and alert analysis
- Analyze logs from multiple sources
- Respond to security incidents using standard procedures
- Create incident and investigation reports
Tools & Lab Practical Activities
- Windows Event Viewer
- Linux Logs (auth.log, syslog)
- Wireshark
- Splunk / ELK Stack (demo or lab based)
- VirusTotal
- Sysmon
- MITRE ATT&CK Framework
- OpenVAS (demo)
Assessment & Evaluation
- Weekly quizzes
- Hands-on SOC labs
- Final SOC simulation & report
- Incident investigation assignments
Certification
- Students who successfully complete the program will receive a Cybersecurity Analyst (CSA) – Certificate of Completion from BGMC.
Course Modules
Explore a comprehensive tools and lab environment designed to give you hands-on experience and practical skill development.
📚 Table of Contents
Introduction to Ethical Hacking
Session Subjects Discussed
- Ethical hacking concepts
- Information security controls
- Cyber laws and ethics
- Standard security procedures
Footprinting and Reconnaissance
Session Subjects Discussed
- Passive and active reconnaissance
- Information gathering techniques
- Reconnaissance tools and countermeasures
Scanning Networks
Session Subjects Discussed
- Network scanning techniques
- Port and service discovery
- Scanning tools and defenses
Enumeration
Session Subjects Discussed
- SMB, FTP, SNMP enumeration
- User and service identification
- Enumeration countermeasures
Vulnerability Analysis
Session Subjects Discussed
- Vulnerability assessment concepts
- CVE and CVSS
- Vulnerability assessment tools
System Hacking
Session Subjects Discussed
Password cracking techniques
Privilege escalation
Steganography and covering tracks
Malware Threats
Session Subjects Discussed
- Types of malware
- Malware analysis basics
- Malware prevention techniques
Sniffing
Session Subjects Discussed
Packet sniffing techniques
Network traffic analysis
Anti-sniffing measures
Social Engineering
Session Subjects Discussed
- Human-based attacks
- Phishing and impersonation
- Social engineering countermeasures
Denial-of-Service
Session Subjects Discussed
- DoS and DDoS attacks
- Attack tools and mitigation
Session Hijacking
Session hijacking techniques
- Authentication weaknesses
- Prevention methods
Evading IDS, Firewalls, and Honeypots
Session Subjects Discussed
- IDS and firewall concepts
- Evasion techniques
- Security countermeasures
Hacking Web Servers
Session Subjects Discussed
- Web server vulnerabilities
- Attack methodologies
- Security hardening
Hacking Web Applications
Session Subjects Discussed
- Web application vulnerabilities
- OWASP Top 10
- Web security best practices
SQL Injection
Session Subjects Discussed
- SQL injection techniques
- Attack detection and prevention
Hacking Wireless Networks
Session Subjects Discussed
- Wireless standards and encryption
- Wireless attacks and countermeasures
Hacking Mobile Platforms
Session Subjects Discussed
- Android and iOS security
- Mobile attack vectors
IoT and OT Hacking
Session Subjects Discussed
- IoT and OT threats
- Hacking methodologies
Cloud Computing
Session Subjects Discussed
- Cloud service models
- Cloud threats and security
Cryptography
Session Subjects Discussed
- Encryption algorithms
- PKI and cryptographic attacks
📚 Table of Contents
Introduction to Cybersecurity & Blue Team
Session Subjects Discussed
- Cybersecurity domains
- Blue Team vs Red Team
- Role of a Cybersecurity Analyst
- SOC structure & workflow
Networking Fundamentals for Security Analysts
Session Subjects Discussed
- Network traffic basics
- TCP/IP, ports & protocols
- Network-based attack overview
Operating Systems Security Basics
Session Subjects Discussed
- Windows security fundamentals
- Linux security fundamentals
- Logs, processes & file monitoring
Cyber Threat Landscape
Session Subjects Discussed
- Malware, ransomware, phishing
- Insider threats
- APT overview
Security Operations Center (SOC)
Session Subjects Discussed
- SOC tiers & responsibilities
- Alert lifecycle
- Incident escalation process
Log Management & Analysis
Session Subjects Discussed
- Importance of logs
- Windows & Linux log analysis
- Log correlation basics
SIEM Fundamentals
Session Subjects Discussed
- SIEM concepts
- Log ingestion & alerting
- SIEM use cases
Threat Detection & Monitoring
Session Subjects Discussed
- Indicators of Compromise (IOCs)
- Signature vs behavior based detection
Malware Analysis (Fundamentals)
Session Subjects Discussed
- Static malware analysis
- Behavioral indicators
Incident Response & Handling
Session Subjects Discussed
Incident response lifecycle
Containment, eradication & recovery
Network Traffic Analysis
Session Subjects Discussed
Packet capture & inspection
Suspicious traffic identification
Endpoint Security & Vulnerability Management
Session Subjects Discussed
- Antivirus vs EDR
- Vulnerability scanning & patching
- Risk prioritization
Threat Intelligence & MITRE ATT&CK
Session Subjects Discussed
- Threat intelligence sources
- MITRE ATT&CK framework
- Mapping attacks to TTPs
Cloud Security Fundamentals
Session Subjects Discussed
Shared responsibility model
Cloud threats & misconfigurations
Reporting, Compliance & Career Prep
Session Subjects Discussed
Incident reporting
Compliance basics (ISO, NIST overview)
SOC interview preparation
👩🏻💻 Related Course
Why Become a Cybersecurity Analyst (CSA)?
Develop in-demand skills to monitor security systems, detect and analyze cyber threats, and protect digital assets—preparing you for high-growth careers in security operations and cyber defense.
High-Demand Career
Enter in-demand cybersecurity analyst roles.
Threat Analysis Skills
Monitor and detect cyber threats.
Career Growth
Protect systems and grow professionally.
We will contact
Get a call back
Get testimonial widget now for Elementor along with a fully responsive & mobile friendly interface to help you manage your client testimonials
Get testimonial widget now for Elementor along with a fully responsive & mobile friendly interface to help you manage your client testimonials
Get testimonial widget now for Elementor along with a fully responsive & mobile friendly interface to help you manage your client testimonials
FAQ About Techverse
Get answers about our NAVTTC, PSDF & TEVTA approved courses, job placement support, and career transformation programs
What is the Cybersecurity Analyst (CSA) program at TechVerse by BGMC?
The CSA program is a career-focused course designed to train learners in security monitoring, threat detection, log analysis, and incident response for real-world security operations environments.
Where is the Cybersecurity Analyst (CSA) training offered?
The CSA training is offered through TechVerse by BGMC via on-campus sessions and instructor-led online classes, providing flexible learning options.
Who can enroll in the Cybersecurity Analyst (CSA) course?
This course is suitable for students, IT professionals, and beginners who want to start a career in cybersecurity analysis or SOC operations.
What skills will I gain from the Cybersecurity Analyst (CSA) program?
You will learn security monitoring, SIEM basics, log analysis, threat detection, incident response fundamentals, and cybersecurity best practices.
Is the Cybersecurity Analyst (CSA) course certified or recognized?
Yes, learners receive a TechVerse by BGMC course completion certificate aligned with industry-relevant cybersecurity practices.
What makes TechVerse’s Cybersecurity Analyst (CSA) course different from others?
The CSA program emphasizes hands-on labs, real-world SOC scenarios, practical tools, and job-oriented training for cybersecurity analyst roles.